Follow
Yan Meng
Yan Meng
Computer Science & Engineering Department, Shanghai Jiao Tong University
Verified email at sjtu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Homonit: Monitoring smart home apps from encrypted traffic
W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2412018
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
2212016
Securing consumer IoT in the smart home: Architecture, challenges, and countermeasures
Y Meng, W Zhang, H Zhu, XS Shen
IEEE Wireless Communications 25 (6), 53-59, 2018
1542018
A federated learning based privacy-preserving smart healthcare system
J Li, Y Meng, L Ma, S Du, H Zhu, Q Pei, X Shen
IEEE Transactions on Industrial Informatics 18 (3), 2021-2031, 2022
1182022
Wivo: Enhancing the security of voice control system via wireless signal in iot environment
Y Meng, Z Wang, W Zhang, P Wu, H Zhu, X Liang, Y Liu
Proceedings of the eighteenth ACM international symposium on mobile ad hoc …, 2018
882018
Voiceprint mimicry attack towards speaker verification system in smart home
L Zhang, Y Meng, J Yu, C Xiang, B Falk, H Zhu
IEEE INFOCOM 2020-IEEE conference on computer communications, 377-386, 2020
492020
Your microphone array retains your identity: A robust voice liveness detection system for smart speaker
Y Meng, J Li, M Pillari, A Deopujari, L Brennan, H Shamsie, H Zhu, Y Tian
USENIX Security, 1077-1094, 2022
422022
Liveness detection for voice user interface via wireless signals in iot environment
Y Meng, H Zhu, J Li, J Li, Y Liu
IEEE Transactions on Dependable and Secure Computing 18 (6), 2996-3011, 2021
392021
Revealing your mobile password via WiFi signals: Attacks and countermeasures
Y Meng, J Li, H Zhu, X Liang, Y Liu, N Ruan
IEEE Transactions on Mobile Computing 19 (2), 432-449, 2020
382020
Attacks and defenses in location-based social networks: a heuristic number theory approach
J Peng, Y Meng, M Xue, X Hei, KW Ross
2015 International Symposium on Security and Privacy in Social Networks and …, 2015
162015
Poster: Reavatar: Virtual reality de-anonymization attack through correlating movement signatures
B Falk, Y Meng, Y Zhan, H Zhu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
152021
Automatic permission optimization framework for privacy enhancement of mobile applications
Y Qu, S Du, S Li, Y Meng, L Zhang, H Zhu
IEEE Internet of Things Journal 8 (9), 7394-7406, 2020
152020
Dissecting click fraud autonomy in the wild
T Zhu, Y Meng, H Hu, X Zhang, M Xue, H Zhu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
122021
Detecting vehicle anomaly by sensor consistency: An edge computing based mechanism
Z Wang, F Guo, Y Meng, H Li, H Zhu, Z Cao
2018 IEEE Global Communications Conference (GLOBECOM), 1-7, 2018
82018
Edge-assisted stream scheduling scheme for the green-communication-based IoT
L Wang, Y Meng, H Zhu, M Tang, K Ota
IEEE Internet of Things Journal 6 (4), 7282-7292, 2019
72019
Thwarting longitudinal location exposure attacks in advertising ecosystem via edge computing
L Yu, S Zhang, L Zhou, Y Meng, S Du, H Zhu
2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022
62022
De-anonymization Attacks on Metaverse
Y Meng, Y Zhan, J Li, S Du, H Zhu, XS Shen
IEEE INFOCOM 2023, 2023
52023
Data Poisoning Attack against Anomaly Detectors in Digital Twin-Based Networks
S Li, W Wu, Y Meng, J Li, H Zhu, XS Shen
IEEE ICC 2023 6, 7, 2023
42023
Secure and efficient uav tracking in space-air-ground integrated network
J Li, W Zhang, Y Meng, S Li, L Ma, Z Liu, H Zhu
IEEE Transactions on Vehicular Technology 72 (8), 10682-10695, 2023
42023
Unleashing cheapfakes through trojan plugins of large language models
T Dong, G Chen, S Li, M Xue, R Holland, Y Meng, Z Liu, H Zhu
arXiv preprint arXiv:2312.00374, 2023
32023
The system can't perform the operation now. Try again later.
Articles 1–20