Follow
Chen Yan
Chen Yan
Associate Professor, Zhejiang University, College of EE
Verified email at zju.edu.cn - Homepage
Title
Cited by
Cited by
Year
Dolphinattack: Inaudible voice commands
G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
8372017
Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle
C Yan, W Xu, J Liu
Def Con 24 (8), 109, 2016
4272016
Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles
W Xu, C Yan, W Jia, X Ji, J Liu
IEEE Internet of Things Journal 5 (6), 5015-5029, 2018
1592018
SoK: A Minimalist Approach to Formalizing Analog Sensor Security
C Yan, H Shin, C Bolton, W Xu, Y Kim, K Fu
2020 IEEE Symposium on Security and Privacy (SP), 480-495, 2020
712020
The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification
C Yan, Y Long, X Ji, W Xu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
692019
The feasibility of injecting inaudible voice commands to voice assistants
C Yan, G Zhang, X Ji, T Zhang, T Zhang, W Xu
IEEE Transactions on Dependable and Secure Computing 18 (3), 1108-1124, 2019
672019
Cybersecurity and medical devices: a practical guide for cardiac electrophysiologists
B Ransford, DB Kramer, D Foo Kune, J Auto de Medeiros, C Yan, W Xu, ...
Pacing and Clinical Electrophysiology 40 (8), 913-917, 2017
622017
Poltergeist: Acoustic adversarial machine learning against cameras and computer vision
X Ji, Y Cheng, Y Zhang, K Wang, C Yan, W Xu, K Fu
2021 IEEE Symposium on Security and Privacy (SP), 160-175, 2021
452021
A survey on voice assistant security: Attacks and countermeasures
C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu
ACM Computing Surveys 55 (4), 1-36, 2022
312022
Rolling colors: Adversarial laser exploits against traffic light recognition
C Yan, Z Xu, Z Yin, S Mangard, X Ji, W Xu, K Zhao, Y Zhou, T Wang, G Gu, ...
31st USENIX Security Symposium (USENIX Security 22), 1957-1974, 2022
212022
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle
Z Jin, J Xiaoyu, Y Cheng, B Yang, C Yan, W Xu
2023 IEEE Symposium on Security and Privacy (SP), 710-727, 2023
202023
On Cuba, diplomats, ultrasound, and intermodulation distortion
C Yan, K Fu, W Xu
Computers in biology and medicine 104, 250-266, 2019
182019
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
K Wang, R Mitev, C Yan, X Ji, AR Sadeghi, W Xu
USENIX Security, 2022
172022
Nauth: Secure face-to-face device authentication via nonlinearity
X Zhou, X Ji, C Yan, J Deng, W Xu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2080-2088, 2019
172019
Wight: Wired ghost touch attack on capacitive touchscreens
Y Jiang, X Ji, K Wang, C Yan, R Mitev, AR Sadeghi, W Xu
2022 IEEE Symposium on Security and Privacy (SP), 984-1001, 2022
112022
{GlitchHiker}: Uncovering Vulnerabilities of Image Signal Transmission with {IEMI}
Q Jiang, X Ji, C Yan, Z Xie, H Lou, W Xu
32nd USENIX Security Symposium (USENIX Security 23), 7249-7266, 2023
72023
Method of defending against inaudible attacks on voice assistant based on machine learning
W Xu, JI Xiaoyu, G Zhang, C Yan, T Zhang, T Zhang
US Patent 11,450,324, 2022
72022
Learning normality is enough: a software-based mitigation against inaudible voice attacks
X Li, X Ji, C Yan, C Li, Y Li, Z Zhang, W Xu
32nd USENIX Security Symposium (USENIX Security 23), 2455-2472, 2023
52023
A Nonlinearity-based Secure Face-to-Face Device Authentication for Mobile Devices
X Ji, X Zhou, C Yan, J Deng, W Xu
IEEE Transactions on Mobile Computing, 1-1, 2020
32020
Volttack: Control IoT devices by manipulating power supply voltage
K Wang, S Xiao, X Ji, C Yan, C Li, W Xu
2023 IEEE Symposium on Security and Privacy (SP), 1771-1788, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20