Chen Yan
Chen Yan
Assistant Researcher, Zhejiang University, College of EE
Verified email at - Homepage
Cited by
Cited by
Dolphinattack: Inaudible voice commands
G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle
C Yan, W Xu, J Liu
Def Con 24 (8), 109, 2016
Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles
W Xu, C Yan, W Jia, X Ji, J Liu
IEEE Internet of Things Journal 5 (6), 5015-5029, 2018
Cybersecurity and medical devices: a practical guide for cardiac electrophysiologists
B Ransford, DB Kramer, D Foo Kune, J Auto de Medeiros, C Yan, W Xu, ...
Pacing and Clinical Electrophysiology 40 (8), 913-917, 2017
The feasibility of injecting inaudible voice commands to voice assistants
C Yan, G Zhang, X Ji, T Zhang, T Zhang, W Xu
IEEE Transactions on Dependable and Secure Computing 18 (3), 1108-1124, 2019
The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification
C Yan, Y Long, X Ji, W Xu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
SoK: A Minimalist Approach to Formalizing Analog Sensor Security
C Yan, H Shin, C Bolton, W Xu, Y Kim, K Fu
2020 IEEE Symposium on Security and Privacy (SP), 480-495, 2020
On Cuba, diplomats, ultrasound, and intermodulation distortion
C Yan, K Fu, W Xu
Computers in biology and medicine 104, 250-266, 2019
Nauth: Secure face-to-face device authentication via nonlinearity
X Zhou, X Ji, C Yan, J Deng, W Xu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2080-2088, 2019
Poltergeist: Acoustic adversarial machine learning against cameras and computer vision
X Ji, Y Cheng, Y Zhang, K Wang, C Yan, W Xu, K Fu
2021 IEEE Symposium on Security and Privacy (SP), 160-175, 2021
Method of defending against inaudible attacks on voice assistant based on machine learning
W Xu, JI Xiaoyu, G Zhang, C Yan, T Zhang, T Zhang
US Patent App. 16/853,782, 2020
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
K Wang, R Mitev, C Yan, X Ji, AR Sadeghi, W Xu
USENIX Security, 2022
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
Y Jiang, X Ji, K Wang, C Yan, R Mitev, AR Sadeghi, W Xu
2022 IEEE Symposium on Security and Privacy (SP), 1537-1537, 2022
A Nonlinearity-based Secure Face-to-Face Device Authentication for Mobile Devices
X Ji, X Zhou, C Yan, J Deng, W Xu
IEEE Transactions on Mobile Computing, 1-1, 2020
Method and system for generating image adversarial examples based on an acoustic wave
JI Xiaoyu, W Xu, Y Cheng, Y Zhang, K Wang, C Yan
US Patent App. 17/702,662, 2022
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing
Y Long, C Yan, S Prasad, W Xu, K Fu
arXiv preprint arXiv:2205.03971, 2022
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition
C Yan, Z Xu, Z Yin, X Ji, W Xu
arXiv preprint arXiv:2204.02675, 2022
徐文渊, 郭世泽, 冀晓宇, 闫琛
中国计算机学会通讯 18 (2), 46-52, 2022
A Survey on Voice Assistant Security: Attacks and Countermeasures
C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu
ACM Computing Surveys (CSUR), 2022
勒索软件: 我们如何爬出泥沼
K Fu, H Thimbleby, W Xu, C Yan
中国医疗设备 32 (7), 167-168, 2017
The system can't perform the operation now. Try again later.
Articles 1–20