Qiben Yan

Orcid: 0000-0001-6272-7668

According to our database1, Qiben Yan authored at least 128 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TBP: Temporal Beam Prediction for Mobile Millimeter-Wave Networks.
IEEE Internet Things J., July, 2024

ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification.
IEEE Trans. Inf. Forensics Secur., 2024

Optical Lens Attack on Monocular Depth Estimation for Autonomous Driving.
CoRR, 2024

Decoding Emotions: Unveiling Facial Expressions through Acoustic Sensing with Contrastive Attention.
CoRR, 2024

Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving.
CoRR, 2024

Optical Lens Attack on Deep Learning Based Monocular Depth Estimation.
CoRR, 2024

Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation.
CoRR, 2024

The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs.
CoRR, 2024

Privacy-Preserving Diffusion Model Using Homomorphic Encryption.
CoRR, 2024

SoilCares: Towards Low-cost Soil Macronutrients and Moisture Monitoring Using RF-VNIR Sensing.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024

End-to-End Decentralized Tracking of Carbon Footprint using Internet of Things and Distributed Databases.
Proceedings of the 7th Conference on Cloud and Internet of Things, 2024

Sync-Millibottleneck Attack on Microservices Cloud Architecture.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Multi-Turn Hidden Backdoor in Large Language Model-powered Chatbot Models.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
IoTCom: Dissecting Interaction Threats in IoT Systems.
IEEE Trans. Software Eng., April, 2023

AutoThing: A Secure Transaction Framework for Self-Service Things.
IEEE Trans. Serv. Comput., 2023

Motif-Level Anomaly Detection in Dynamic Graphs.
IEEE Trans. Inf. Forensics Secur., 2023

TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts.
IEEE Trans. Inf. Forensics Secur., 2023

Graph Learning for Interactive Threat Detection in Heterogeneous Smart Home Rule Data.
Proc. ACM Manag. Data, 2023

Security Threat Mitigation for Smart Contracts: A Comprehensive Survey.
ACM Comput. Surv., 2023

A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
CoRR, 2023

Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems.
CoRR, 2023

ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems.
CoRR, 2023

A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT.
CoRR, 2023

Security Threat Mitigation For Smart Contracts: A Survey.
CoRR, 2023

VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

FacER: Contrastive Attention based Expression Recognition via Smartphone Earpiece Speaker.
Proceedings of the IEEE INFOCOM 2023, 2023

Federated IoT Interaction Vulnerability Analysis.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders.
Proceedings of the IEEE International Conference on Communications, 2023

Jailbreaker in Jail: Moving Target Defense for Large Language Models.
Proceedings of the 10th ACM Workshop on Moving Target Defense, 2023

2022
A Systematical Study on Application Performance Management Libraries for Apps.
IEEE Trans. Software Eng., 2022

AuthIoT: A Transferable Wireless Authentication Scheme for IoT Devices Without Input Interface.
IEEE Internet Things J., 2022

URadio: Wideband Ultrasound Communication for Smart Home Applications.
IEEE Internet Things J., 2022

Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens.
CoRR, 2022

Et tu, Blockchain? Outsmarting Smart Contracts via Social Engineering.
CoRR, 2022

Mining Function Homology of Bot Loaders from Honeypot Logs.
CoRR, 2022

DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems.
Proceedings of the 31st USENIX Security Symposium, 2022

GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Scalable Privacy-preserving Geo-distance Evaluation for Precision Agriculture IoT Systems.
ACM Trans. Sens. Networks, 2021

SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation.
IEEE Trans. Inf. Forensics Secur., 2021

Structured Sparsity Model Based Trajectory Tracking Using Private Location Data Release.
IEEE Trans. Dependable Secur. Comput., 2021

DM-COM: Combining Device-to-Device and MU-MIMO Communications for Cellular Networks.
IEEE Internet Things J., 2021

Effective detection of mobile malware behavior based on explainable deep neural network.
Neurocomputing, 2021

On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications.
Comput. Stand. Interfaces, 2021

Constraint-Based Inference of Heuristics for Foreign Exchange Trade Model Optimization.
CoRR, 2021

Security and Privacy in the Emerging Cyber-Physical World: A Survey.
IEEE Commun. Surv. Tutorials, 2021

Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning.
Comput. Secur., 2021

Osprey: A fast and accurate patch presence test framework for binaries.
Comput. Commun., 2021

NELoRa: Towards Ultra-low SNR LoRa Communication with Neural-enhanced Demodulation.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

System-Wide Security for Offline Payment Terminals.
Proceedings of the Security and Privacy in Communication Networks, 2021

JammingBird: Jamming-Resilient Communications for Vehicular Ad Hoc Networks.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021

UD-MIMO: Uplink Distributed MIMO for Wireless LANs.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021

SoundFence: Securing Ultrasonic Sensors in Vehicles Using Physical-Layer Defense.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021

IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Rectifying Administrated ERC20 Tokens.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Blockumulus: A Scalable Framework for Smart Contracts on the Cloud.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server.
Proceedings of the Database Systems for Advanced Applications, 2021

EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Jamsa: A Utility Optimal Contextual Online Learning Framework for Anti-Jamming Wireless Scheduling Under Reactive Jamming Attack.
IEEE Trans. Netw. Sci. Eng., 2020

DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code.
IEEE Trans. Inf. Forensics Secur., 2020

A Practical Downlink NOMA Scheme for Wireless LANs.
IEEE Trans. Commun., 2020

Multi-attributed heterogeneous graph convolutional network for bot detection.
Inf. Sci., 2020

Deep and broad URL feature mining for android malware detection.
Inf. Sci., 2020

Tree decomposition based anomalous connected subgraph scanning for detecting and forecasting events in attributed social media networks.
Neurocomputing, 2020

TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data.
Comput. Secur., 2020

SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot.
Proceedings of the Security and Privacy in Communication Networks, 2020

Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

SDR receiver using commodity wifi via physical-layer signal reconstruction.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

Generating Robust Audio Adversarial Examples with Temporal Dependency.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

2019
A mobile malware detection method using behavior features in network traffic.
J. Netw. Comput. Appl., 2019

Special issue on advances in security and privacy in IoT.
J. Netw. Comput. Appl., 2019

Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment.
IEEE Internet Things J., 2019

Obfusifier: Obfuscation-Resistant Android Malware Detection System.
Proceedings of the Security and Privacy in Communication Networks, 2019

Demystifying Application Performance Management Libraries for Android.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and Countermeasure.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Characterizing Location-based Mobile Tracking in Mobile Ad Networks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Significant Permission Identification for Machine-Learning-Based Android Malware Detection.
IEEE Trans. Ind. Informatics, 2018

Detecting Android Malware Leveraging Text Semantics of Network Flows.
IEEE Trans. Inf. Forensics Secur., 2018

Machine learning based mobile malware detection using highly imbalanced network traffic.
Inf. Sci., 2018

Internet of Things: Security and privacy in a connected world.
Future Gener. Comput. Syst., 2018

Lexical Mining of Malicious URLs for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2018

GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications.
Proceedings of the Security and Privacy in Communication Networks, 2018

Uplink MU-MIMO in Asynchronous Wireless LANs.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

Deep and Broad Learning Based Detection of Android Malware via Network Traffic.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

High-bandwidth ultrasonic communication using graphene-based acoustic devices.
Proceedings of the IEEE INFOCOM 2018, 2018

Tracking location privacy leakage of mobile ad networks at scale.
Proceedings of the IEEE INFOCOM 2018, 2018

Towards best secure coding practice for implementing SSL/TLS.
Proceedings of the IEEE INFOCOM 2018, 2018

MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

PSCluster: Differentially Private Spatial Cluster Detection for Mobile Crowdsourcing Applications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Efficient Signature Generation for Classifying Cross-Architecture IoT Malware.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Enabling Technologies towards 5G Mobile Networks.
Mob. Inf. Syst., 2017

Very Short Intermittent DDoS Attacks in an Unsaturated System.
Proceedings of the Security and Privacy in Communication Networks, 2017

Security analysis of Internet-of-Things: A case study of august smart lock.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

TextDroid: Semantics-based detection of mobile malware using network flows.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Identity management using blockchain for cognitive cellular networks.
Proceedings of the IEEE International Conference on Communications, 2017

Design and analysis of elastic handoff in cognitive cellular networks.
Proceedings of the IEEE International Conference on Communications, 2017

Black penguin: On the feasibility of detecting intrusion with homogeneous memory.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Enabling jamming-resistant communications in wireless MIMO networks.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

SPRIDE: Scalable and private continual geo-distance evaluation for precision agriculture.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Jamming Resilient Communication Using MIMO Interference Cancellation.
IEEE Trans. Inf. Forensics Secur., 2016

DroidCollector: A High Performance Framework for High Quality Android Traffic Collection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2016

SigPID: significant permission identification for android malware detection.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Achieving 5As in Cloud Centric Cognitive Cellular Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
A First Look at Android Malware Traffic in First Few Minutes.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Using Map-Based Interactive Interface for Understanding and Characterizing Crime Data in Cities.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015

PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Real-time Android Malware Detection System Based on Network Traffic Analysis.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2014

MIMO-based jamming resilient communication in wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Proximity-Based Security Techniques for Mobile Users in Wireless Networks.
IEEE Trans. Inf. Forensics Secur., 2013

Non-parametric passive traffic monitoring in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Proximity-based security using ambient radio signals.
Proceedings of IEEE International Conference on Communications, 2013

2012
On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication.
IEEE Wirel. Commun. Lett., 2012

Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding.
IEEE J. Sel. Areas Commun., 2012

Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012


  Loading...