Yan Meng

Orcid: 0000-0001-5445-0347

Affiliations:
  • Shanghai Jiao Tong University, Department of Computer Science and Engineering, China


According to our database1, Yan Meng authored at least 40 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
De-Anonymizing Avatars in Virtual Reality: Attacks and Countermeasures.
IEEE Trans. Mob. Comput., December, 2024

An HASM-Assisted Voice Disguise Scheme for Emotion Recognition of IoT-Enabled Voice Interface.
IEEE Internet Things J., November, 2024

Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability.
IEEE Trans. Mob. Comput., August, 2024

Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces.
IEEE Trans. Dependable Secur. Comput., 2024

DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

Detection and Attribution of Diffusion Model of Character Animation Based on Spatio-Temporal Attention.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024

Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

VPVet: Vetting Privacy Policies of Virtual Reality Apps.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network.
IEEE Trans. Veh. Technol., August, 2023

Security in Smart Home Networks
Wireless Networks, Springer, ISBN: 978-3-031-24184-0, 2023

Unleashing Cheapfakes through Trojan Plugins of Large Language Models.
CoRR, 2023

Vetting Privacy Policies in VR: A Data Minimization Principle Perspective.
Proceedings of the IEEE INFOCOM 2023, 2023

De-anonymization Attacks on Metaverse.
Proceedings of the IEEE INFOCOM 2023, 2023

MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging.
Proceedings of the IEEE INFOCOM 2023, 2023

GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

EM-Whisperer: A Voice Injection Attack via Powerline for Virtual Meeting Scenarios.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks.
Proceedings of the IEEE International Conference on Communications, 2023

Understanding and Identifying Cross-Platform UI Framework Based Potentially Unwanted Apps.
Proceedings of the IEEE Global Communications Conference, 2023

Privacy Computing with Right to Be Forgotten in Trusted Execution Environment.
Proceedings of the IEEE Global Communications Conference, 2023

Wireless Traffic Analysis Based Side-channel Attacks and Countermeasure in Smart Home.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
A Federated Learning Based Privacy-Preserving Smart Healthcare System.
IEEE Trans. Ind. Informatics, 2022

WiCapose: Multi-modal fusion based transparent authentication in mobile environments.
J. Inf. Secur. Appl., 2022

Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.
Proceedings of the 31st USENIX Security Symposium, 2022

Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment.
IEEE Trans. Dependable Secur. Comput., 2021

Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications.
IEEE Internet Things J., 2021

Dissecting Click Fraud Autonomy in the Wild.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures.
IEEE Trans. Mob. Comput., 2020

Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Securing App Behaviors in Smart Home: A Human-App Interaction Perspective.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

2019
Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT.
IEEE Internet Things J., 2019

An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Securing Consumer IoT in the Smart Home: Architecture, Challenges, and Countermeasures.
IEEE Wirel. Commun., 2018

WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism.
Proceedings of the IEEE Global Communications Conference, 2018

HoMonit: Monitoring Smart Home Apps from Encrypted Traffic.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2016
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015


  Loading...