default search action
Yan Jia
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yan Jia 0001 — National University of Defense Technology, College of Computer, Changsha, China
- Yan Jia 0002 — A*STAR, Data Storage Institute, Singapore (and 1 more)
- Yan Jia 0003 — Anhui University, School of Mathematical Sciences, Hefei, China
- Yan Jia 0004 — Nanjing University of Posts and Telecommunications, School of Geographic and Biologic Information, China (and 1 more)
- Yan Jia 0005 — RWTH Aachen University, Germany
- Yan Jia 0006 — Beijing Institute of Technology, School of Mechatronical Engineering, China
- Yan Jia 0007 — College of Shenyang artillery, China
- Yan Jia 0008 — University of York, Department of Computer Science, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Zhiwei Chang, Hanfeng Zhang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu:
Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals. Comput. Commun. 220: 138-148 (2024) - [j21]Ning Hu, Yan Jia, Man Zhang, Yun Li, Huanyu Zhao, Lei Luo:
Security Assessment of Intelligent Connected Vehicles Based on the Cyber Range. IEEE Netw. 38(3): 57-62 (2024) - [j20]Zipeng Ye, Wenjian Luo, Qi Zhou, Zhenqian Zhu, Yuhui Shi, Yan Jia:
Gradient Inversion Attacks: Impact Factors Analyses and Privacy Enhancement. IEEE Trans. Pattern Anal. Mach. Intell. 46(12): 9834-9850 (2024) - [j19]Yan Jia, Shuyi Liu, Yongqing Liu, Limin Zhai, Yifan Gong, Xiangkun Zhang:
Echo-Level SAR Imaging Simulation of Wakes Excited by a Submerged Body. Sensors 24(4): 1094 (2024) - [j18]Shuyi Liu, Yan Jia, Yongqing Liu, Limin Zhai, Xiangkun Zhang:
A New BiRNN-SVA Method for Side Lobe Suppression. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 1167-1175 (2024) - [j17]Zipeng Ye, Wenjian Luo, Muhammad Luqman Naseem, Xiangkai Yang, Yuhui Shi, Yan Jia:
C2FMI: Corse-to-Fine Black-Box Model Inversion Attack. IEEE Trans. Dependable Secur. Comput. 21(3): 1437-1450 (2024) - [j16]Zipeng Ye, Wenjian Luo, Ruizhuo Zhang, Hongwei Zhang, Yuhui Shi, Yan Jia:
An Evolutionary Attack for Revealing Training Data of DNNs With Higher Feature Fidelity. IEEE Trans. Dependable Secur. Comput. 21(4): 4193-4205 (2024) - [c25]Fannv He, Yan Jia, Jiayu Zhao, Yue Fang, Jice Wang, Mengyue Feng, Peng Liu, Yuqing Zhang:
Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps. NDSS 2024 - [c24]Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing:
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations. SP 2024: 2385-2403 - [c23]Yu Zhu, Yan Jia, Kaiyi Zou, Xiaoguang Niu:
Smartphone Indoor Fusion Localization with Trust Region-Based Magnetic Matching. WASA (1) 2024: 14-25 - [i7]Yan Jia, Yuxin Song, Zihou Liu, Qingyin Tan, Fangming Wang, Yu Zhang, Zheli Liu:
A Survey on Consumer IoT Traffic: Security and Privacy. CoRR abs/2403.16149 (2024) - [i6]Qi Zhou, Zipeng Ye, Yubo Tang, Wenjian Luo, Yuhui Shi, Yan Jia:
Evolutionary Trigger Detection and Lightweight Model Repair Based Backdoor Defense. CoRR abs/2407.05396 (2024) - 2023
- [j15]Zeqing Zhao, Sifan Ma, Yan Jia, Jingyu Hou, Lin Yang, Junjie Wang:
Disentangling Content Information by Combining ASR and TTS Bottleneck Features for Voice Conversion. Int. J. Asian Lang. Process. 33(1): 2350011:1-2350011:17 (2023) - [j14]Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang, Shaoying Liu, Thar Baker:
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters. IEEE Trans. Software Eng. 49(10): 4624-4638 (2023) - [j13]Sixian Yu, Qiang Cao, Chenyu Wang, Guoai Xu, Huanhuan Ma, Yucheng Zhu, Yihang Peng, Yan Jia:
Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V. IEEE Trans. Veh. Technol. 72(11): 15028-15039 (2023) - [c22]Zhiwei Chang, Hanfeng Zhang, Yue Yang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu:
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm. AIS&P (1) 2023: 499-512 - [c21]Weiqi Hu, Ye Wang, Yan Jia:
Multi-Modal Knowledge Representation: A Survey. DSC 2023: 68-75 - [c20]Lu Luo, Li Wang, Peng Wu, Yan Jia:
A Decentralized Gossip Management Method for Household Microgrids. ISKE 2023: 389-393 - [c19]Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing:
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain. USENIX Security Symposium 2023: 3403-3420 - 2022
- [j12]Ya-Li Hou, Yan Jia, Zhijiang Hou, Xiaoli Hao, Yan Shen:
IAFFNet: Illumination-Aware Feature Fusion Network for All-Day RGB-Thermal Semantic Segmentation of Road Scenes. IEEE Access 10: 129702-129711 (2022) - [j11]Bing Jia, Hao Gong, Zhaopeng Zong, Tao Zhou, Thar Baker, Ahmed Al-Shamma'a, Yan Jia:
An incentive mechanism in expert-decision-based crowdsensing networks. Appl. Soft Comput. 122: 108834 (2022) - [j10]Bingxiang Xu, Xiaoli Li, Xiaomeng Gao, Yan Jia, Jing Liu, Feifei Li, Zhihua Zhang:
DeNOPA: decoding nucleosome positions sensitively with sparse ATAC-seq data. Briefings Bioinform. 23(1) (2022) - [j9]Junfeng Wang, Yan Jia, Dongbo Wang, Wenjing Xiao, Zhenfei Wang:
Weighted IForest and siamese GRU on small sample anomaly detection in healthcare. Comput. Methods Programs Biomed. 218: 106706 (2022) - [j8]Shuyi Liu, Yan Jia, Yongqing Liu, Xiangkun Zhang:
Research on Ultra-Wideband NLFM Waveform Synthesis and Grating Lobe Suppression. Sensors 22(24): 9829 (2022) - [j7]Zhuoyan Gao, Yan Jia, Shuyi Liu, Xiangkun Zhang:
A 2-D Frequency-Domain Imaging Algorithm for Ground-Based SFCW-ArcSAR. IEEE Trans. Geosci. Remote. Sens. 60: 1-14 (2022) - [c18]Ze Jin, Luyi Xing, Yiwei Fang, Yan Jia, Bin Yuan, Qixu Liu:
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies. CCS 2022: 1647-1661 - [c17]Chong Mo, Ye Wang, Yan Jia, Cui Luo:
Time-aware Quaternion Convolutional Network for Temporal Knowledge Graph Reasoning. ICONIP (4) 2022: 300-312 - [c16]Zeqing Zhao, Sifan Ma, Yan Jia, Jingyu Hou, Lin Yang, Junjie Wang:
Mix-Guided VC: Any-to-many Voice Conversion by Combining ASR and TTS Bottleneck Features. ISCSLP 2022: 96-100 - [c15]Yan Jia, Mi Hong, Jingyu Hou, Kailong Ren, Sifan Ma, Jin Wang, Yinglin Ji, Fangzhen Peng, Lin Yang, Junjie Wang:
LeVoice ASR Systems for the ISCSLP 2022 Intelligent Cockpit Speech Recognition Challenge. ISCSLP 2022: 517-521 - [c14]Haoxu Wang, Yan Jia, Zeqing Zhao, Xuyang Wang, Junjie Wang, Ming Li:
Generating TTS Based Adversarial Samples for Training Wake-Up Word Detection Systems Against Confusing Words. Odyssey 2022: 402-406 - [c13]Yijing Liu, Yan Jia, Qingyin Tan, Zheli Liu, Luyi Xing:
How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion. USENIX Security Symposium 2022: 863-880 - [c12]Xiaojie Guo, Ye Han, Zheli Liu, Ding Wang, Yan Jia, Jin Li:
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes. USENIX Security Symposium 2022: 1487-1504 - [c11]Ruixin Zhang, Yan Jia, Meng Zhang:
Conceptual Framework for Collaborative Governance of Urban Smart Elderly Care Services Data Resources -Based on the Case Analysis of the Capital Cities of Three Provinces in Northeast China. UV 2022: 1-6 - [i5]Haoxu Wang, Yan Jia, Zeqing Zhao, Xuyang Wang, Junjie Wang, Ming Li:
Generating Adversarial Samples For Training Wake-up Word Detection Systems Against Confusing Words. CoRR abs/2201.00167 (2022) - [i4]Rongkuan Ma, Qiang Wei, Jingyi Wang, Shunkai Zhu, Shouling Ji, Peng Cheng, Yan Jia, Qingxian Wang:
Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study. CoRR abs/2212.14296 (2022) - 2021
- [j6]Zekun Wang, Yan Jia, Chang Cai, Yinpeng Chen, Na Li, Miao Yang, Qing'an Li:
Study on the Optimal Configuration of a Wind-Solar-Battery-Fuel Cell System Based on a Regional Power Supply. IEEE Access 9: 47056-47068 (2021) - [j5]Yan Jia, Hailong Ye:
Optimal decay rates of weak solutions for the 2D co-rotation FENE dumbbell model of polymeric flows. Appl. Math. Lett. 113: 106860 (2021) - [j4]Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yan Jia, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu:
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE Internet Things J. 8(14): 11621-11639 (2021) - [c10]Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zhang, XiaoFeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang, Deqing Zou, Hai Jin:
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels. CCS 2021: 1289-1305 - [c9]Huangrui Chu, Yechen Wang, Ran Ju, Yan Jia, Haoxu Wang, Ming Li, Qi Deng:
Call For Help Detection In Emergent Situations Using Keyword Spotting And Paralinguistic Analysis. ICMI Companion 2021: 104-111 - [c8]Yan Jia, Xingming Wang, Xiaoyi Qin, Yinping Zhang, Xuyang Wang, Junjie Wang, Dong Zhang, Ming Li:
The 2020 Personalized Voice Trigger Challenge: Open Datasets, Evaluation Metrics, Baseline System and Results. Interspeech 2021: 4239-4243 - 2020
- [j3]Lei Zhang, Keqilao Meng, Yan Jia, Jianlong Ma, Rihan Hai:
A Multistep Wind Speed Forecasting System Considering Double Time Series Features. IEEE Access 8: 161018-161030 (2020) - [c7]Haiwei Wu, Yan Jia, Yuanfei Nie, Ming Li:
Domain Aware Training for Far-Field Small-Footprint Keyword Spotting. INTERSPEECH 2020: 2562-2566 - [c6]Yan Jia, Luyi Xing, Yuhang Mao, Dongfang Zhao, XiaoFeng Wang, Shangru Zhao, Yuqing Zhang:
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds. SP 2020: 465-481 - [c5]Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang:
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. USENIX Security Symposium 2020: 1183-1200 - [i3]Haiwei Wu, Yan Jia, Yuanfei Nie, Ming Li:
Mutli-task Learning with Alignment Loss for Far-field Small-Footprint Keyword Spotting. CoRR abs/2005.03633 (2020) - [i2]Yan Jia, Zexin Cai, Murong Ma, Zeqing Zhao, Xuyang Wang, Junjie Wang, Ming Li:
Training Wake Word Detection with Synthesized Speech Data on Confusion Words. CoRR abs/2011.01460 (2020)
2010 – 2019
- 2019
- [j2]Xiao Ma, Fu Shen, Yan Jia, Yuwei Xia, Qihua Li, Jianping Lu:
MRI-based radiomics of rectal cancer: preoperative assessment of the pathological features. BMC Medical Imaging 19(1): 86:1-86:7 (2019) - [j1]Wei Zhou, Yan Jia, Anni Peng, Yuqing Zhang, Peng Liu:
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet Things J. 6(2): 1606-1616 (2019) - [c4]Yao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Peng Liu, Yuqing Zhang:
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution. ESORICS (1) 2019: 638-657 - [c3]Yuhang Mao, Xuejun Li, Yan Jia, Shangru Zhao, Yuqing Zhang:
Security Analysis of Smart Home Based on Life Cycle. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1444-1449 - [c2]Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. USENIX Security Symposium 2019: 1133-1150 - 2018
- [c1]Dongyang Zhao, Jiuming Huang, Yan Jia:
Chinese Name Entity Recognition Using Highway-LSTM-CRF. ACAI 2018: 64:1-64:5 - [i1]Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps. CoRR abs/1811.03241 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint