Chen Yan

Orcid: 0000-0003-4430-5263

Affiliations:
  • Zhejiang University, Department of Electrical Engineering, China


According to our database1, Chen Yan authored at least 28 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound.
IEEE Internet Things J., April, 2024

Toward Pitch-Insensitive Speaker Verification via Soundfield.
IEEE Internet Things J., January, 2024

2023
A Survey on Voice Assistant Security: Attacks and Countermeasures.
ACM Comput. Surv., 2023

Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time.
CoRR, 2023

Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI.
Proceedings of the 32nd USENIX Security Symposium, 2023

DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Volttack: Control IoT Devices by Manipulating Power Supply Voltage.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

BitDance: Manipulating UART Serial Communication with IEMI.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

MicPro: Microphone-based Voice Privacy Protection.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices.
IEEE Trans. Mob. Comput., 2022

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
CoRR, 2022

Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition.
Proceedings of the 31st USENIX Security Symposium, 2022

GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
Proceedings of the 31st USENIX Security Symposium, 2022

WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Power IoT System Security Monitoring Based On Power Consumption Side Channel Information.
Proceedings of the 5th International Conference on Electronics and Electrical Engineering Technology, 2022

2021
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants.
IEEE Trans. Dependable Secur. Comput., 2021

Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
SoK: A Minimalist Approach to Formalizing Analog Sensor Security.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
On Cuba, diplomats, ultrasound, and intermodulation distortion.
Comput. Biol. Medicine, 2019

NAuth: Secure Face-to-Face Device Authentication via Nonlinearity.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles.
IEEE Internet Things J., 2018

2017
DolphinAtack: Inaudible Voice Commands.
CoRR, 2017

DolphinAttack: Inaudible Voice Commands.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017


  Loading...