Jeff Yan

Affiliations:
  • Newcastle University, UK


According to our database1, Jeff Yan authored at least 62 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Wallcamera: Reinventing the Wheel?
CoRR, 2024

2023
SoK: Acoustic Side Channels.
CoRR, 2023

2022
Differential Imaging Forensics: A Feasibility Study.
CoRR, 2022

Gender Bias in Password Managers.
CoRR, 2022

2021
Research on the Security of Visual Reasoning CAPTCHA.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
SonarSnoop: active acoustic side-channel attacks.
Int. J. Inf. Sec., 2020

Scams in modern societies: how does China differ from the world?
CoRR, 2020

2019
Differential Imaging Forensics.
CoRR, 2019

From Sicilian mafia to Chinese "scam villages".
CoRR, 2019

Hearing your touch: A new acoustic side channel on smartphones.
CoRR, 2019

Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

2018
How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018

How Does Match-Fixing Inform Computer Game Security?
Proceedings of the Security Protocols XXVI, 2018

A Security Analysis of Honeywords.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Towards Reactive Acoustic Jamming for Personal Voice Assistants.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

2017
POSTER: Who was Behind the Camera? - Towards Some New Forensics.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

A dual-axis MEMS vibratory gyroscope ASIC with 0.0061°/s/VHz noise floor over 480 Hz bandwidth.
Proceedings of the IEEE Asian Solid-State Circuits Conference, 2017

2016
Acceleration Attacks on PBKDF2: Or, What Is inside the Black-Box of oclHashcat?
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016

Novel Security and Privacy Perspectives of Camera Fingerprints.
Proceedings of the Security Protocols XXIV, 2016

A Simple Generic Attack on Text Captchas.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

The Science and Detection of Tilting.
Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval, 2016

Failures of Security APIs: A New Case.
Proceedings of the Financial Cryptography and Data Security, 2016

Targeted Online Password Guessing: An Underestimated Threat.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

A security analysis of automated chinese turing tests.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
A Frequency Scan Scheme for PLL-Based Locking to High-Q MEMS Resonators.
Proceedings of the 28th International Conference on VLSI Design, 2015

Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

2014
Captcha as Graphical Passwords - A New Security Primitive Based on Hard AI Problems.
IEEE Trans. Inf. Forensics Secur., 2014

Security Analyses of Click-based Graphical Passwords via Image Point Memorability.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Security implications of password discretization for click-based graphical passwords.
Proceedings of the 22nd International World Wide Web Conference, 2013

Towards New Security Primitives Based on Hard AI Problems.
Proceedings of the Security Protocols XXI, 2013

Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

The robustness of hollow CAPTCHAs.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
CAPTCHA Design: Color, Usability, and Security.
IEEE Internet Comput., 2012

A statistical aimbot detection method for online FPS games.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

Aimbot Detection in Online FPS Games Using a Heuristic Method Based on Distribution Comparison Matrix.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

2011
Shoulder surfing defence for recall-based graphical passwords.
Proceedings of the Symposium On Usable Privacy and Security, 2011

System Security Research at Newcastle.
Proceedings of the First SysSec Workshop 2011, 2011

2010
Security Design in Human Computation Games.
Proceedings of the Security Protocols XVIII, 2010

Security Design in Human Computation Games (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

The robustness of a new CAPTCHA.
Proceedings of the Third European Workshop on System Security, 2010

Attacks and design of image recognition CAPTCHAs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Collusion Detection in Online Bridge.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
An Investigation of Cheating in Online Games.
IEEE Secur. Priv., 2009

CAPTCHA Security: A Case Study.
IEEE Secur. Priv., 2009

Magic Bullet: a dual-purpose computer game.
Proceedings of the ACM SIGKDD Workshop on Human Computation, Paris, France, June 28, 2009, 2009

Streamlining Attacks on CAPTCHAs with a Computer Game.
Proceedings of the IJCAI 2009, 2009

2008
Usability of CAPTCHAs or usability issues in CAPTCHA design.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

A low-cost attack on a Microsoft captcha.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Graphical passwords & qualitative spatial relations.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Is FacePIN secure and usable?
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Do background images improve "draw a secret" graphical passwords?
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Bot, Cyborg and Automated Turing Test.
Proceedings of the Security Protocols, 2006

Detecting cheaters for multiplayer games: theory, design and implementation[1].
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Enhancing Collaborative Spam Detection with Bloom Filters.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
A systematic classification of cheating in online games.
Proceedings of the 4th Workshop on Network and System Support for Games, 2005

2004
Password Memorability and Security: Empirical Results.
IEEE Secur. Priv., 2004

2003
Security Design in Online Games.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Security issues in online games.
Electron. Libr., 2002

2001
An Attack on A Traitor Tracing Scheme.
IACR Cryptol. ePrint Arch., 2001

A note on proactive password checking.
Proceedings of the New Security Paradigms Workshop 2001, 2001


  Loading...