| CARVIEW |

Qinhong Jiang
Researcher at IMCL, The Hong Kong Polytechnic University
- Hong Kong SAR, China
- Github
- Google Scholar
Publications
The * sign stands for co-first authors (equal contribution).
[C7] SoK: Security of Cyber-physical Systems Under Intentional Electromagnetic Interference Attacks
Qinhong Jiang*, Yan Long*, Youqian Zhang*, Chen Yan, Xiaoyu Ji, Xiapu Luo, Kevin Fu, Jiannong Cao, Wenyuan Xu
In SEC’26: USENIX Security Symposium, 2026 (To appear)
[J3] EMI Backdoor: An Electromagnetic-Interference-based Backdoor Attack Against Computer Vision Systems
Mengjie Sun, Peizhuo Lv, Shengzhi Zhang, Jianshuo Liu, Kai Chen, Hong Li, Zhi Li, Qinhong Jiang, Liming Sun.
In Journal of Computer Security (To appear)
[C6] GhostShot: Manipulating the Image of CCD Cameras with Electromagnetic Interference
Yanze Ren, Qinhong Jiang, Chen Yan, Xiaoyu Ji, Wenyuan Xu
In NDSS’25: The Network and Distributed System Security Symposium, 2025 (PDF, Slides)
[C5] PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR
Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, Wenyuan Xu
In NDSS’25: The Network and Distributed System Security Symposium, 2025 (PDF, Demo)
[C4] Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection
Youqian Zhang, Chunxi Yang, Eugene Y Fu, Qinhong Jiang, Chen Yan, Sze-Yiu Chau, Grace Ngai, Hong-Va Leong, Xiapu Luo, Wenyuan Xu
In ICME’24: IEEE Conference on Multimedia Expo, 2024
[C3] EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras
Yan Long*, Qinhong Jiang*, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, Kevin Fu.
In NDSS’24: The Network and Distributed System Security Symposium, 2024 (PDF, Demo)
[J2] Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification
Xiaoyu Ji*, Qinhong Jiang*, Chaohao Li, Zhuoyang Shi, Wenyuan Xu.
In TIFS: IEEE Transactions on Information Forensics and Security, 2024(PDF, Demo)
[C2] GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards
Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu.
In NDSS’24: The Network and Distributed System Security Symposium, 2024 (PDF, Demo)
[C1] GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI
Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, and Wenyuan Xu.
In SEC’23: USENIX Security Symposium, 2023 (PDF, Presentation)
[J1] A Survey on Voice Assistant Security: Attacks and Countermeasures
Chen Yan, Xiaoyu Ji, Kai Wang, Qinhong Jiang, Zizhi Jin, Wenyuan Xu.
In CSUR: ACM Computing Surveys, 55:4, 1-36, 2022 (PDF)