Chen Yan

Orcid: 0000-0003-4430-5263

Affiliations:
  • Zhejiang University, Department of Electrical Engineering, China


According to our database1, Chen Yan authored at least 40 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Laser-Based LiDAR Spoofing: Effects Validation, Capability Quantification, and Countermeasures.
IEEE Internet Things J., January, 2025

2024
Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.
ACM Trans. Sens. Networks, November, 2024

Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound.
IEEE Internet Things J., April, 2024

Toward Pitch-Insensitive Speaker Verification via Soundfield.
IEEE Internet Things J., January, 2024

Analyzing and Defending GhostTouch Attack Against Capacitive Touchscreens.
IEEE Trans. Dependable Secur. Comput., 2024

Marionette: Manipulate Your Touchscreen via a Charging Cable.
IEEE Trans. Dependable Secur. Comput., 2024

PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR.
CoRR, 2024

SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models.
CoRR, 2024

Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack.
Proceedings of the ACM on Web Conference 2024, 2024

EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

SafeEar: Content Privacy-Preserving Audio Deepfake Detection.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
A Survey on Voice Assistant Security: Attacks and Countermeasures.
ACM Comput. Surv., 2023

Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI.
Proceedings of the 32nd USENIX Security Symposium, 2023

DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Volttack: Control IoT Devices by Manipulating Power Supply Voltage.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

BitDance: Manipulating UART Serial Communication with IEMI.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

MicPro: Microphone-based Voice Privacy Protection.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices.
IEEE Trans. Mob. Comput., 2022

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
CoRR, 2022

Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition.
Proceedings of the 31st USENIX Security Symposium, 2022

GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
Proceedings of the 31st USENIX Security Symposium, 2022

WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Power IoT System Security Monitoring Based On Power Consumption Side Channel Information.
Proceedings of the 5th International Conference on Electronics and Electrical Engineering Technology, 2022

2021
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants.
IEEE Trans. Dependable Secur. Comput., 2021

Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
SoK: A Minimalist Approach to Formalizing Analog Sensor Security.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
On Cuba, diplomats, ultrasound, and intermodulation distortion.
Comput. Biol. Medicine, 2019

NAuth: Secure Face-to-Face Device Authentication via Nonlinearity.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles.
IEEE Internet Things J., 2018

2017
DolphinAtack: Inaudible Voice Commands.
CoRR, 2017

DolphinAttack: Inaudible Voice Commands.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017


  Loading...