Yan Meng
Orcid: 0000-0001-5445-0347Affiliations:
- Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
According to our database1,
Yan Meng
authored at least 40 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Mob. Comput., December, 2024
An HASM-Assisted Voice Disguise Scheme for Emotion Recognition of IoT-Enabled Voice Interface.
IEEE Internet Things J., November, 2024
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability.
IEEE Trans. Mob. Comput., August, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
Detection and Attribution of Diffusion Model of Character Animation Based on Spatio-Temporal Attention.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Veh. Technol., August, 2023
Wireless Networks, Springer, ISBN: 978-3-031-24184-0, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Understanding and Identifying Cross-Platform UI Framework Based Potentially Unwanted Apps.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Wireless Traffic Analysis Based Side-channel Attacks and Countermeasure in Smart Home.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
2022
IEEE Trans. Ind. Informatics, 2022
WiCapose: Multi-modal fusion based transparent authentication in mobile environments.
J. Inf. Secur. Appl., 2022
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.
Proceedings of the 31st USENIX Security Symposium, 2022
Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications.
IEEE Internet Things J., 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Mob. Comput., 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
2019
IEEE Internet Things J., 2019
An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Securing Consumer IoT in the Smart Home: Architecture, Challenges, and Countermeasures.
IEEE Wirel. Commun., 2018
WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015