Yan Jia
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
IEEE Trans. Pattern Anal. Mach. Intell., December, 2024
IEEE Netw., May, 2024
Sensors, February, 2024
An Evolutionary Attack for Revealing Training Data of DNNs With Higher Feature Fidelity.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024
CoRR, 2024
Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals.
Comput. Commun., 2024
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
2023
Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V.
IEEE Trans. Veh. Technol., November, 2023
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters.
IEEE Trans. Software Eng., October, 2023
Disentangling Content Information by Combining ASR and TTS Bottleneck Features for Voice Conversion.
Int. J. Asian Lang. Process., March, 2023
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 18th International Conference on Intelligent Systems and Knowledge Engineering, 2023
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
IEEE Trans. Geosci. Remote. Sens., 2022
Sensors, 2022
Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study.
CoRR, 2022
Generating Adversarial Samples For Training Wake-up Word Detection Systems Against Confusing Words.
CoRR, 2022
Comput. Methods Programs Biomed., 2022
Briefings Bioinform., 2022
Appl. Soft Comput., 2022
IAFFNet: Illumination-Aware Feature Fusion Network for All-Day RGB-Thermal Semantic Segmentation of Road Scenes.
IEEE Access, 2022
Conceptual Framework for Collaborative Governance of Urban Smart Elderly Care Services Data Resources -Based on the Case Analysis of the Capital Cities of Three Provinces in Northeast China.
Proceedings of the 6th International Conference on Universal Village, 2022
How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion.
Proceedings of the 31st USENIX Security Symposium, 2022
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
Proceedings of the 31st USENIX Security Symposium, 2022
Generating TTS Based Adversarial Samples for Training Wake-Up Word Detection Systems Against Confusing Words.
Proceedings of the Odyssey 2022: The Speaker and Language Recognition Workshop, 28 June, 2022
Mix-Guided VC: Any-to-many Voice Conversion by Combining ASR and TTS Bottleneck Features.
Proceedings of the 13th International Symposium on Chinese Spoken Language Processing, 2022
LeVoice ASR Systems for the ISCSLP 2022 Intelligent Cockpit Speech Recognition Challenge.
Proceedings of the 13th International Symposium on Chinese Spoken Language Processing, 2022
Proceedings of the Neural Information Processing - 29th International Conference, 2022
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Internet Things J., 2021
Optimal decay rates of weak solutions for the 2D co-rotation FENE dumbbell model of polymeric flows.
Appl. Math. Lett., 2021
Study on the Optimal Configuration of a Wind-Solar-Battery-Fuel Cell System Based on a Regional Power Supply.
IEEE Access, 2021
The 2020 Personalized Voice Trigger Challenge: Open Datasets, Evaluation Metrics, Baseline System and Results.
Proceedings of the 22nd Annual Conference of the International Speech Communication Association, Interspeech 2021, Brno, Czechia, August 30, 2021
Call For Help Detection In Emergent Situations Using Keyword Spotting And Paralinguistic Analysis.
Proceedings of the ICMI '21 Companion: Companion Publication of the 2021 International Conference on Multimodal Interaction, Montreal, QC, Canada, October 18, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
CoRR, 2020
Mutli-task Learning with Alignment Loss for Far-field Small-Footprint Keyword Spotting.
CoRR, 2020
IEEE Access, 2020
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Proceedings of the 29th USENIX Security Symposium, 2020
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 21st Annual Conference of the International Speech Communication Association, 2020
2019
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
IEEE Internet Things J., 2019
MRI-based radiomics of rectal cancer: preoperative assessment of the pathological features.
BMC Medical Imaging, 2019
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps.
CoRR, 2018
Proceedings of the 2018 International Conference on Algorithms, 2018