Qiben Yan
Orcid: 0000-0001-6272-7668
According to our database1,
Qiben Yan
authored at least 128 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., July, 2024
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification.
IEEE Trans. Inf. Forensics Secur., 2024
Decoding Emotions: Unveiling Facial Expressions through Acoustic Sensing with Contrastive Attention.
CoRR, 2024
Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving.
CoRR, 2024
Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation.
CoRR, 2024
CoRR, 2024
SoilCares: Towards Low-cost Soil Macronutrients and Moisture Monitoring Using RF-VNIR Sensing.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024
End-to-End Decentralized Tracking of Carbon Footprint using Internet of Things and Distributed Databases.
Proceedings of the 7th Conference on Cloud and Internet of Things, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Software Eng., April, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Graph Learning for Interactive Threat Detection in Heterogeneous Smart Home Rule Data.
Proc. ACM Manag. Data, 2023
ACM Comput. Surv., 2023
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
CoRR, 2023
CoRR, 2023
CoRR, 2023
A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT.
CoRR, 2023
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
FacER: Contrastive Attention based Expression Recognition via Smartphone Earpiece Speaker.
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 10th ACM Workshop on Moving Target Defense, 2023
2022
IEEE Trans. Software Eng., 2022
AuthIoT: A Transferable Wireless Authentication Scheme for IoT Devices Without Input Interface.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Scalable Privacy-preserving Geo-distance Evaluation for Precision Agriculture IoT Systems.
ACM Trans. Sens. Networks, 2021
SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation.
IEEE Trans. Inf. Forensics Secur., 2021
Structured Sparsity Model Based Trajectory Tracking Using Private Location Data Release.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Internet Things J., 2021
Effective detection of mobile malware behavior based on explainable deep neural network.
Neurocomputing, 2021
Comput. Stand. Interfaces, 2021
Constraint-Based Inference of Heuristics for Foreign Exchange Trade Model Optimization.
CoRR, 2021
IEEE Commun. Surv. Tutorials, 2021
Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning.
Comput. Secur., 2021
Comput. Commun., 2021
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021
IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server.
Proceedings of the Database Systems for Advanced Applications, 2021
EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion.
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Jamsa: A Utility Optimal Contextual Online Learning Framework for Anti-Jamming Wireless Scheduling Under Reactive Jamming Attack.
IEEE Trans. Netw. Sci. Eng., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Inf. Sci., 2020
Tree decomposition based anomalous connected subgraph scanning for detecting and forecasting events in attributed social media networks.
Neurocomputing, 2020
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data.
Comput. Secur., 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
2019
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment.
IEEE Internet Things J., 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
Significant Permission Identification for Machine-Learning-Based Android Malware Detection.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Inf. Forensics Secur., 2018
Machine learning based mobile malware detection using highly imbalanced network traffic.
Inf. Sci., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
PSCluster: Differentially Private Spatial Cluster Detection for Mobile Crowdsourcing Applications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
SPRIDE: Scalable and private continual geo-distance evaluation for precision agriculture.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
DroidCollector: A High Performance Framework for High Quality Android Traffic Collection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Using Map-Based Interactive Interface for Understanding and Characterizing Crime Data in Cities.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of IEEE International Conference on Communications, 2013
2012
On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication.
IEEE Wirel. Commun. Lett., 2012
Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding.
IEEE J. Sel. Areas Commun., 2012
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012