Yan Jia

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Gradient Inversion Attacks: Impact Factors Analyses and Privacy Enhancement.
IEEE Trans. Pattern Anal. Mach. Intell., December, 2024

Security Assessment of Intelligent Connected Vehicles Based on the Cyber Range.
IEEE Netw., May, 2024

Echo-Level SAR Imaging Simulation of Wakes Excited by a Submerged Body.
Sensors, February, 2024

An Evolutionary Attack for Revealing Training Data of DNNs With Higher Feature Fidelity.
IEEE Trans. Dependable Secur. Comput., 2024

C2FMI: Corse-to-Fine Black-Box Model Inversion Attack.
IEEE Trans. Dependable Secur. Comput., 2024

A New BiRNN-SVA Method for Side Lobe Suppression.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

Evolutionary Trigger Detection and Lightweight Model Repair Based Backdoor Defense.
CoRR, 2024

A Survey on Consumer IoT Traffic: Security and Privacy.
CoRR, 2024

Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals.
Comput. Commun., 2024

Smartphone Indoor Fusion Localization with Trust Region-Based Magnetic Matching.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V.
IEEE Trans. Veh. Technol., November, 2023

Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters.
IEEE Trans. Software Eng., October, 2023

Disentangling Content Information by Combining ASR and TTS Bottleneck Features for Voice Conversion.
Int. J. Asian Lang. Process., March, 2023

Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain.
Proceedings of the 32nd USENIX Security Symposium, 2023

A Decentralized Gossip Management Method for Household Microgrids.
Proceedings of the 18th International Conference on Intelligent Systems and Knowledge Engineering, 2023

Multi-Modal Knowledge Representation: A Survey.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
A 2-D Frequency-Domain Imaging Algorithm for Ground-Based SFCW-ArcSAR.
IEEE Trans. Geosci. Remote. Sens., 2022

Research on Ultra-Wideband NLFM Waveform Synthesis and Grating Lobe Suppression.
Sensors, 2022

Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study.
CoRR, 2022

Generating Adversarial Samples For Training Wake-up Word Detection Systems Against Confusing Words.
CoRR, 2022

Weighted IForest and siamese GRU on small sample anomaly detection in healthcare.
Comput. Methods Programs Biomed., 2022

DeNOPA: decoding nucleosome positions sensitively with sparse ATAC-seq data.
Briefings Bioinform., 2022

An incentive mechanism in expert-decision-based crowdsensing networks.
Appl. Soft Comput., 2022

IAFFNet: Illumination-Aware Feature Fusion Network for All-Day RGB-Thermal Semantic Segmentation of Road Scenes.
IEEE Access, 2022

Conceptual Framework for Collaborative Governance of Urban Smart Elderly Care Services Data Resources -Based on the Case Analysis of the Capital Cities of Three Provinces in Northeast China.
Proceedings of the 6th International Conference on Universal Village, 2022

How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion.
Proceedings of the 31st USENIX Security Symposium, 2022

Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
Proceedings of the 31st USENIX Security Symposium, 2022

Generating TTS Based Adversarial Samples for Training Wake-Up Word Detection Systems Against Confusing Words.
Proceedings of the Odyssey 2022: The Speaker and Language Recognition Workshop, 28 June, 2022

Mix-Guided VC: Any-to-many Voice Conversion by Combining ASR and TTS Bottleneck Features.
Proceedings of the 13th International Symposium on Chinese Spoken Language Processing, 2022

LeVoice ASR Systems for the ISCSLP 2022 Intelligent Cockpit Speech Recognition Challenge.
Proceedings of the 13th International Symposium on Chinese Spoken Language Processing, 2022

Time-aware Quaternion Convolutional Network for Temporal Knowledge Graph Reasoning.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems.
IEEE Internet Things J., 2021

Optimal decay rates of weak solutions for the 2D co-rotation FENE dumbbell model of polymeric flows.
Appl. Math. Lett., 2021

Study on the Optimal Configuration of a Wind-Solar-Battery-Fuel Cell System Based on a Regional Power Supply.
IEEE Access, 2021

The 2020 Personalized Voice Trigger Challenge: Open Datasets, Evaluation Metrics, Baseline System and Results.
Proceedings of the 22nd Annual Conference of the International Speech Communication Association, Interspeech 2021, Brno, Czechia, August 30, 2021

Call For Help Detection In Emergent Situations Using Keyword Spotting And Paralinguistic Analysis.
Proceedings of the ICMI '21 Companion: Companion Publication of the 2021 International Conference on Multimodal Interaction, Montreal, QC, Canada, October 18, 2021

Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Training Wake Word Detection with Synthesized Speech Data on Confusion Words.
CoRR, 2020

Mutli-task Learning with Alignment Loss for Far-field Small-Footprint Keyword Spotting.
CoRR, 2020

A Multistep Wind Speed Forecasting System Considering Double Time Series Features.
IEEE Access, 2020

Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Proceedings of the 29th USENIX Security Symposium, 2020

Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Domain Aware Training for Far-Field Small-Footprint Keyword Spotting.
Proceedings of the 21st Annual Conference of the International Speech Communication Association, 2020

2019
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
IEEE Internet Things J., 2019

MRI-based radiomics of rectal cancer: preoperative assessment of the pathological features.
BMC Medical Imaging, 2019

Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms.
Proceedings of the 28th USENIX Security Symposium, 2019

Security Analysis of Smart Home Based on Life Cycle.
Proceedings of the 2019 IEEE SmartWorld, 2019

Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps.
CoRR, 2018

Chinese Name Entity Recognition Using Highway-LSTM-CRF.
Proceedings of the 2018 International Conference on Algorithms, 2018


  Loading...