Chen Wang
Orcid: 0000-0001-9737-1673Affiliations:
- Louisiana State University, Baton Rouge, LA, USA
- Rutgers University, North Brunswick, NJ, USA (former)
- Stevens Institute of Technology, Hoboken, NJ, USA (former)
According to our database1,
Chen Wang
authored at least 50 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Fast Detection of Handheld Phone-Distracted Driving by Sensing the Driver's Hand-Grip.
IEEE Trans. Veh. Technol., August, 2024
Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand Biometric.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
2023
Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Enhanced In-air Signature Verification via Hand Skeleton Tracking to Defeat Robot-level Replays.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices.
IEEE Trans. Mob. Comput., 2022
Toward Verifying the User of Motion-Controlled Robotic Arm Systems via the Robot Behavior.
IEEE Internet Things J., 2022
PCR-Auth: Solving Authentication Puzzle Challenge with Encoded Palm Contact Response.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Demo: I Am a Robot: First-person Robotic Arm Control with Hand Motions in Virtual Reality.
Proceedings of the Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers, 2022
Proceedings of the Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers, 2022
Low-effort User Authentication for Kiosk Systems based on Smartphone User's Gripping Hand Geometry.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
Unobtrusive Pedestrian Identification by Leveraging Footstep Sounds with Replay Resistance.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
Human perception-enhanced camera system for web conferences leveraging device motions.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
Notification privacy protection via unobtrusive gripping hand verification using media sounds.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
IEEE Trans. Mob. Comput., 2020
WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity.
CoRR, 2020
Comput. Networks, 2020
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
EchoLock: Towards Low-effort Mobile User Identification Leveraging Structure-borne Echos.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Internet Things J., 2019
Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers.
CoRR, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the IoT Technologies for HealthCare - 6th EAI International Conference, 2019
Demo: Monitoring Movement Dynamics of Robot Cars and Drones Using Smartphone's Built-in Sensors.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
IEEE Trans. Mob. Comput., 2017
Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Delay and Capacity Analysis in MANETs with Correlated Mobility and ${f}$ -Cast Relay.
IEEE Trans. Parallel Distributed Syst., 2014
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
Accurate rogue access point localization leveraging fine-grained channel information.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2012
Throughput capacity in mobile ad-hoc networks with correlated mobility and f-cast relay.
Proceedings of the 2012 IEEE Global Communications Conference, 2012