default search action
Chen Yan 0001
Person information
- affiliation: Zhejiang University, Department of Electrical Engineering, China
Other persons with the same name
- Chen Yan — disambiguation page
- Chen Yan 0002 — Grenoble Alpes University, Inria, CNRS, Grenoble INP, LIG, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Xinfeng Li, Zhicong Zheng, Chen Yan, Chaohao Li, Xiaoyu Ji, Wenyuan Xu:
Toward Pitch-Insensitive Speaker Verification via Soundfield. IEEE Internet Things J. 11(1): 1175-1189 (2024) - [j8]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. IEEE Internet Things J. 11(8): 13108-13124 (2024) - [j7]Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu:
Marionette: Manipulate Your Touchscreen via a Charging Cable. IEEE Trans. Dependable Secur. Comput. 21(4): 3309-3323 (2024) - [j6]Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu:
Analyzing and Defending GhostTouch Attack Against Capacitive Touchscreens. IEEE Trans. Dependable Secur. Comput. 21(5): 4360-4375 (2024) - [c23]Youqian Zhang, Chunxi Yang, Eugene Yujun Fu, Qinhong Jiang, Chen Yan, Sze-Yiu Chau, Grace Ngai, Hong Va Leong, Xiapu Luo, Wenyuan Xu:
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection. ICME 2024: 1-6 - [c22]Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu:
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards. NDSS 2024 - [c21]Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. NDSS 2024 - [c20]Yan Long, Qinhong Jiang, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, Kevin Fu:
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras. NDSS 2024 - [c19]Zizhi Jin, Xuancun Lu, Bo Yang, Yushi Cheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack. WWW 2024: 3031-3042 - [i8]Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu:
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models. CoRR abs/2404.06666 (2024) - [i7]Youqian Zhang, Chunxi Yang, Eugene Yujun Fu, Qinhong Jiang, Chen Yan, Sze-Yiu Chau, Grace Ngai, Hong Va Leong, Xiapu Luo, Wenyuan Xu:
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection. CoRR abs/2407.16327 (2024) - [i6]Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR. CoRR abs/2409.17907 (2024) - 2023
- [j5]Chen Yan, Xiaoyu Ji, Kai Wang, Qinhong Jiang, Zizhi Jin, Wenyuan Xu:
A Survey on Voice Assistant Security: Attacks and Countermeasures. ACM Comput. Surv. 55(4): 84:1-84:36 (2023) - [c18]Shilin Xiao, Xiaoyu Ji, Chen Yan, Zhicong Zheng, Wenyuan Xu:
MicPro: Microphone-based Voice Privacy Protection. CCS 2023: 1302-1316 - [c17]Zhicong Zheng, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems. ACM Multimedia 2023: 7849-7858 - [c16]Zhixin Xie, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
BitDance: Manipulating UART Serial Communication with IEMI. RAID 2023: 63-76 - [c15]Kai Wang, Shilin Xiao, Xiaoyu Ji, Chen Yan, Chaohao Li, Wenyuan Xu:
Volttack: Control IoT Devices by Manipulating Power Supply Voltage. SP 2023: 1771-1788 - [c14]Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu:
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle. SP 2023: 1822-1839 - [c13]Ruochen Zhou, Xiaoyu Ji, Chen Yan, Yi-Chao Chen, Wenyuan Xu, Chaohao Li:
DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation. SP 2023: 3113-3128 - [c12]Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu:
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing. SP 2023: 3432-3449 - [c11]Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu:
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks. USENIX Security Symposium 2023: 2455-2472 - [c10]Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu:
GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI. USENIX Security Symposium 2023: 7249-7266 - [i5]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. CoRR abs/2306.16022 (2023) - [i4]Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. CoRR abs/2308.01040 (2023) - 2022
- [j4]Xiaoyu Ji, Xinyan Zhou, Chen Yan, Jiangyi Deng, Wenyuan Xu:
A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices. IEEE Trans. Mob. Comput. 21(4): 1155-1171 (2022) - [c9]Jiachang Wen, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
Power IoT System Security Monitoring Based On Power Consumption Side Channel Information. EEET 2022: 59-65 - [c8]Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu:
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens. SP 2022: 984-1001 - [c7]Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu:
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch. USENIX Security Symposium 2022: 1543-1559 - [c6]Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu:
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. USENIX Security Symposium 2022: 1957-1974 - [i3]Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu:
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. CoRR abs/2204.02675 (2022) - [i2]Yan Long, Chen Yan, Shivan Prasad, Wenyuan Xu, Kevin Fu:
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing. CoRR abs/2205.03971 (2022) - 2021
- [j3]Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu:
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants. IEEE Trans. Dependable Secur. Comput. 18(3): 1108-1124 (2021) - [c5]Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu:
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision. SP 2021: 160-175 - 2020
- [c4]Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu:
SoK: A Minimalist Approach to Formalizing Analog Sensor Security. SP 2020: 233-248
2010 – 2019
- 2019
- [j2]Chen Yan, Kevin Fu, Wenyuan Xu:
On Cuba, diplomats, ultrasound, and intermodulation distortion. Comput. Biol. Medicine 104: 250-266 (2019) - [c3]Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu:
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification. CCS 2019: 1215-1229 - [c2]Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu:
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity. INFOCOM 2019: 2080-2088 - 2018
- [j1]Wenyuan Xu, Chen Yan, Weibin Jia, Xiaoyu Ji, Jianhao Liu:
Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles. IEEE Internet Things J. 5(6): 5015-5029 (2018) - 2017
- [c1]Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu:
DolphinAttack: Inaudible Voice Commands. CCS 2017: 103-117 - [i1]Guoming Zhang, Chen Yan, Xiaoyu Ji, Taimin Zhang, Tianchen Zhang, Wenyuan Xu:
DolphinAtack: Inaudible Voice Commands. CoRR abs/1708.09537 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint