Yanjiao Chen

Orcid: 0000-0002-1382-0679

Affiliations:
  • Zhejiang University, College of Electrical Engineering, China
  • Wuhan University, Department of Computer Science, China (former)
  • University of Toronto, Department of Electrical and Computer Engineering, ON, Canada (former)
  • Hong Kong University of Science and Technology, Department of Computer Science and Engineering, Hong Kong (former, PhD 2015)


According to our database1, Yanjiao Chen authored at least 164 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Adaptive scheduling for Internet of Vehicles using deconfounded graph transfer learning.
Comput. Networks, 2025

2024
Trading off Coverage and Emergency for Hybrid Task Scheduling in Traffic Anomaly Detection.
IEEE Trans. Mob. Comput., December, 2024

TeethFa: Real-Time, Hand-Free Teeth Gestures Interaction Using Fabric Sensors.
IEEE Internet Things J., November, 2024

A Spatial-Temporal Gated Hypergraph Convolution Network for Traffic Prediction.
IEEE Trans. Veh. Technol., July, 2024

Evaluating Compressive Sensing on the Security of Computer Vision Systems.
ACM Trans. Sens. Networks, May, 2024

MC-Tracking: Towards Ubiquitous Menstrual Cycle Tracking Using the Smartphone.
IEEE Trans. Mob. Comput., May, 2024

Res-DFNN: An NN-Based Device Fingerprint Extraction Method Using Network Packet Data.
Symmetry, April, 2024

A 3C Authentication: A Cross-Domain, Certificateless, and Consortium-Blockchain-Based Authentication Method for Vehicle-to-Grid Networks in a Smart Grid.
Symmetry, March, 2024

TRCC: Transferable Congestion Control With Reinforcement Learning.
IEEE Internet Things J., January, 2024

SmartSit: Sitting Posture Recognition Through Acoustic Sensing on Smartphones.
IEEE Trans. Multim., 2024

Defending Against Membership Inference Attack for Counterfactual Federated Recommendation With Differentially Private Representation Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models.
IEEE Trans. Dependable Secur. Comput., 2024

KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework.
IEEE Trans. Dependable Secur. Comput., 2024

Effective and Evasive Fuzz Testing-Driven Jailbreaking Attacks against LLMs.
CoRR, 2024

RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer.
CoRR, 2024

SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models.
CoRR, 2024

Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024

Adversarial for Good - Defending Training Data Privacy with Adversarial Attack Wisdom.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024

DIFORMER: An Attention-Based IoT Device Identification Method.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2024

Legilimens: Practical and Unified Content Moderation for Large Language Model Services.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Alchemy: Data-Free Adversarial Training.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
WIB: Real-time, Non-intrusive Blood Pressure Detection Using Smartphones.
ACM Trans. Sens. Networks, November, 2023

PDGes: An Interpretable Detection Model for Parkinson's Disease Using Smartphones.
ACM Trans. Sens. Networks, November, 2023

B<sup>3</sup>: Backdoor Attacks against Black-box Machine Learning Models.
ACM Trans. Priv. Secur., November, 2023

Echo: Reverberation-based Fast Black-Box Adversarial Attacks on Intelligent Audio Systems.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., September, 2023

Ubi-Asthma: Toward Ubiquitous Asthma Detection Using the Smartwatch.
IEEE Internet Things J., July, 2023

Harmony or Involution: Game Inspiring Age-of-Information Optimization for Edge Data Gathering in Internet of Things.
ACM Trans. Sens. Networks, May, 2023

Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions.
IEEE Wirel. Commun., April, 2023

A contract-based energy harvesting mechanism in UAV communication network.
Comput. Commun., February, 2023

Group effect-based privacy-preserving data aggregation for mobile crowdsensing.
Comput. Networks, February, 2023

Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions.
IEEE Trans. Ind. Informatics, 2023

A<sup>2</sup>S<sup>2</sup>-GNN: Rigging GNN-Based Social Status by Adversarial Attacks in Signed Social Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Radar<sup>2</sup>: Passive Spy Radar Detection and Localization Using COTS mmWave Radar.
IEEE Trans. Inf. Forensics Secur., 2023

A GAN-Based Defense Framework Against Model Inversion Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters.
IEEE Trans. Dependable Secur. Comput., 2023

MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Meta-Learning for Human-Centered Wireless Sensing: Architecture, Applications, and Challenges.
IEEE Netw., 2023

WiWalk: Gait-Based Dual-User Identification Using WiFi Device.
IEEE Internet Things J., 2023

NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples.
Proceedings of the ACM Web Conference 2023, 2023

DDS: An Auction Based on a Variant of Data Shapley for Federated Learning.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization.
Proceedings of the 32nd USENIX Security Symposium, 2023

Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion.
Proceedings of the 32nd USENIX Security Symposium, 2023

VILLAIN: Backdoor Attacks Against Vertical Split Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

D-DAE: Defense-Penetrating Model Extraction Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Oblivion: Poisoning Federated Learning by Inducing Catastrophic Forgetting.
Proceedings of the IEEE INFOCOM 2023, 2023

Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Multi-Party Payment Channel Network Based on Smart Contract.
IEEE Trans. Netw. Serv. Manag., December, 2022

Improved Measurement Matrix Construction with Pseudo-Random Sequence in Compressed Sensing.
Wirel. Pers. Commun., 2022

DetectDUI: An In-Car Detection System for Drink Driving and BACs.
IEEE/ACM Trans. Netw., 2022

MPCN-RP: A Routing Protocol for Blockchain-Based Multi-Charge Payment Channel Networks.
IEEE Trans. Netw. Serv. Manag., 2022

Health-Radio: Towards Contactless Myocardial Infarction Detection Using Radio Signals.
IEEE Trans. Mob. Comput., 2022

WiFace: Facial Expression Recognition Using Wi-Fi Signals.
IEEE Trans. Mob. Comput., 2022

An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022

SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation.
IEEE Trans. Dependable Secur. Comput., 2022

Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers.
IEEE Netw., 2022

Ubi-Fatigue: Toward Ubiquitous Fatigue Detection via Contactless Sensing.
IEEE Internet Things J., 2022

Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information.
IEEE Internet Things J., 2022

ZkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System.
IEEE Internet Things J., 2022

NIRSCam: A Mobile Near-Infrared Sensing System for Food Calorie Estimation.
IEEE Internet Things J., 2022

A Multipath Routing for Payment Channel Networks for Internet of Things Microtransactions.
IEEE Internet Things J., 2022

Wet-Ra: Monitoring Diapers Wetness with Wireless Signals.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

A cooperative mobility model for multiple autonomous vehicles.
Comput. Commun., 2022

Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions.
IEEE Commun. Mag., 2022

ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Silhouette: Efficient Cloud Configuration Exploration for Large-Scale Analytics.
IEEE Trans. Parallel Distributed Syst., 2021

A Compressive Integrity Auditing Protocol for Secure Cloud Storage.
IEEE/ACM Trans. Netw., 2021

Stealing Your Android Patterns via Acoustic Signals.
IEEE Trans. Mob. Comput., 2021

SmartSO: Chinese Character and Stroke Order Recognition With Smartwatch.
IEEE Trans. Mob. Comput., 2021

Signed-PageRank: An Efficient Influence Maximization Framework for Signed Social Networks.
IEEE Trans. Knowl. Data Eng., 2021

A Comprehensive Survey of the Key Technologies and Challenges Surrounding Vehicular Ad Hoc Networks.
ACM Trans. Intell. Syst. Technol., 2021

Deep Reinforcement Learning for Smart City Communication Networks.
IEEE Trans. Ind. Informatics, 2021

Magic-hand: Turn a smartwatch into a mouse.
Pervasive Mob. Comput., 2021

Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment.
IEEE J. Sel. Areas Commun., 2021

Matchmaker: Stable Task Assignment With Bounded Constraints for Crowdsourcing Platforms.
IEEE Internet Things J., 2021

A Contract-Based Insurance Incentive Mechanism Boosted by Wearable Technology.
IEEE Internet Things J., 2021

ChestLive: Fortifying Voice-based Authentication with Chest Motion Biometric on Smart Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions.
ACM Comput. Surv., 2021

An adaptive multiple spray-and-wait routing algorithm based on social circles in delay tolerant networks.
Comput. Networks, 2021

Incentivizing cooperative relay in UTXO-based blockchain network.
Comput. Networks, 2021

Trust-Aware sensing Quality estimation for team Crowdsourcing in social IoT.
Comput. Networks, 2021

A Multi-objective Reinforcement Learning Perspective on Internet Congestion Control.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

WIAGE: A Gait-based Age Estimation System Using Wireless Signals.
Proceedings of the IEEE Global Communications Conference, 2021

Trust-aware Crowdsourcing for Radio Environment Mapping with Privacy Preservation.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2021

FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Securing Channel State Information in Multiuser MIMO With Limited Feedback.
IEEE Trans. Wirel. Commun., 2020

A Two-Stage Game Framework to Secure Transmission in Two-Tier UAV Networks.
IEEE Trans. Veh. Technol., 2020

Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools.
IEEE/ACM Trans. Netw., 2020

Razor: Scaling Backend Capacity for Mobile Applications.
IEEE Trans. Mob. Comput., 2020

Privacy-Preserving Collaborative Deep Learning With Unreliable Participants.
IEEE Trans. Inf. Forensics Secur., 2020

LVID: A Multimodal Biometrics Authentication System on Smartphones.
IEEE Trans. Inf. Forensics Secur., 2020

Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments.
IEEE Netw., 2020

Event evolution model for cybersecurity event mining in tweet streams.
Inf. Sci., 2020

SmartHandwriting: Handwritten Chinese Character Recognition With Smartwatch.
IEEE Internet Things J., 2020

PP-SPEC: Securing Spectrum Allocation for Internet of Things.
IEEE Internet Things J., 2020

Crowdcaching: Incentivizing D2D-Enabled Caching via Coalitional Game for IoT.
IEEE Internet Things J., 2020

MFRep: Joint user and employer alignment across heterogeneous social networks.
Neurocomputing, 2020

ForeXGBoost: passenger car sales prediction based on XGBoost.
Distributed Parallel Databases, 2020

Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models.
IEEE Commun. Mag., 2020

SmartGe: Identifying Pen-Holding Gesture With Smartwatch.
IEEE Access, 2020

Eagle: Refining Congestion Control by Learning from the Experts.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse Engineering.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

2019
Privacy-Preserving Spectrum Auction Design: Challenges, Solutions, and Research Directions.
IEEE Wirel. Commun., 2019

Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum.
IEEE/ACM Trans. Netw., 2019

An Incentive Mechanism for Crowdsourcing Systems with Network Effects.
ACM Trans. Internet Techn., 2019

Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones.
IEEE Trans. Mob. Comput., 2019

ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum.
IEEE Trans. Mob. Comput., 2019

CReam: A Smart Contract Enabled Collusion-Resistant e-Auction.
IEEE Trans. Inf. Forensics Secur., 2019

<i>PROST</i>: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
IEEE Trans. Inf. Forensics Secur., 2019

Cooperative Transmission With Priority and Fairness in Edge Computing Systems.
IEEE Access, 2019

Brainstorming-Based Ant Colony Optimization for Vehicle Routing With Soft Time Windows.
IEEE Access, 2019

VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

SmartWriting: Pen-Holding Gesture Recognition with Smartwatch.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

TranGAN: Generative Adversarial Network Based Transfer Learning for Social Tie Prediction.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

WatchOUT: A Practical Secure Pedestrian Warning System Based on Smartphones.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Joint Price Competition and Resource Allocation for Duopoly Femtocell Market.
IEEE Trans. Veh. Technol., 2018

Financial Analysis of Network Upgrade.
IEEE Trans. Veh. Technol., 2018

Ensuring Minimum Spectrum Requirement in Matching-Based Spectrum Allocation.
IEEE Trans. Mob. Comput., 2018

Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training.
IEEE Trans. Knowl. Data Eng., 2018

InPrivate Digging: Enabling Tree-based Distributed Data Mining with Differential Privacy.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

InstantCryptoGram: Secure Image Retrieval Service.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Stable Combinatorial Spectrum Matching.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Time Context-Aware IPTV Program Recommendation Based on Tensor Learning.
Proceedings of the IEEE Global Communications Conference, 2018

2017
A Reverse Auction Framework for Hybrid Access in Femtocell Network.
J. Comput. Sci. Technol., 2017

A general framework to design secure cloud storage protocol using homomorphic encryption scheme.
Comput. Networks, 2017

Personalized user engagement modeling for mobile videos.
Comput. Networks, 2017

Clockwork: Scheduling Cloud Requests in Mobile Applications.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Stable Matching for Spectrum Market with Guaranteed Minimum Requirement.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

Task assignment with guaranteed quality for crowdsourcing platforms.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

A secure cloud storage system based on discrete logarithm problem.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

A truthful auction mechanism for resource provisioning in mobile crowdsensing.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Stable Job Assignment for Crowdsourcing.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Incentivizing crowdsourcing systems with network effects.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Spectrum Matching.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Multi-seller combinatorial spectrum auction with reserve prices.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

Many-to-many matching for combinatorial spectrum trading.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Dynamic Spectrum Auction in Wireless Communication
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-319-14030-8, 2015

LOTUS: Location-Aware Online Truthful Double Auction for Dynamic Spectrum Access.
IEEE Trans. Wirel. Commun., 2015

Balancing Income and User Utility in Spectrum Allocation.
IEEE Trans. Mob. Comput., 2015

From QoS to QoE: A Tutorial on Video Quality Assessment.
IEEE Commun. Surv. Tutorials, 2015

A privacy-aware framework for targeted advertising.
Comput. Networks, 2015

Understanding viewer engagement of video service in Wi-Fi network.
Comput. Networks, 2015

Financial analysis of 4G network deployment.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Heart rate estimation using wrist-acquired photoplethysmography under different types of daily life motion artifact.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

QoE-Aware Dynamic Video Rate Adaptation.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
TAMES: A Truthful Double Auction for Multi-Demand Heterogeneous Spectrums.
IEEE Trans. Parallel Distributed Syst., 2014

A Bayesian game model for joint pricing and spectrum allocation strategy of femtocell service providers.
Proceedings of the IEEE International Conference on Communications, 2014

2013
TAMES: A Truthful Auction Mechanism for heterogeneous spectrum allocation.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Balance of revenue and social welfare in FCC's spectrum allocation.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Incentive mechanism for hybrid access in femtocell network with traffic uncertainty.
Proceedings of IEEE International Conference on Communications, 2013

A privacy-aware framework for online advertisement targeting.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
TAHES: A Truthful Double Auction Mechanism for Heterogeneous Spectrums.
IEEE Trans. Wirel. Commun., 2012

Utility-Aware Refunding Framework for Hybrid Access Femtocell Network.
IEEE Trans. Wirel. Commun., 2012

TAHES: Truthful double Auction for Heterogeneous Spectrums.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A reverse auction framework for access permission transaction to promote hybrid access in femtocell network.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

An economic framework for Information Platform.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Convergence Dynamics of Graphical Congestion Games.
Proceedings of the Game Theory for Networks, 2012

2011
Macro-femto heterogeneous network deployment and management: from business models to technical solutions.
IEEE Wirel. Commun., 2011

Optimal Pricing and Spectrum Allocation for Wireless Service Provider on Femtocell Deployment.
Proceedings of IEEE International Conference on Communications, 2011


  Loading...