Qiben Yan

This page is a disambiguation page, it actually contains multiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2026
VULCAN: Vision-Language-Model Enhanced Multi-Agent Cooperative Navigation for Indoor Fire-Disaster Response.
CoRR, April, 2026

Toward Quantum-Optimized Flow Scheduling in Multi-Beam Digital Satellites.
CoRR, March, 2026

2025
Impact of Phonetics on Speaker Identity in Adversarial Voice Attack.
CoRR, September, 2025

SoK: How Robust is Audio Watermarking in Generative AI models?
CoRR, March, 2025

Cyber Defense Reinvented: Large Language Models as Threat Intelligence Copilots.
CoRR, February, 2025

High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis.
Proceedings of the Computer Security - ESORICS 2025, 2025

2024
FlexLLM: Exploring LLM Customization for Moving Target Defense on Black-Box LLMs Against Jailbreak Attacks.
CoRR, 2024

Privacy-Preserving Diffusion Model Using Homomorphic Encryption.
CoRR, 2024

A Distributed System for Optimization of Carbon Emitting Resource Consumption in Supply Chains.
Proceedings of the International Symposium on Networks, Computers and Communications, 2024

ClearAI: AI-Driven Speech Enhancement for Hypophonic Speech.
Proceedings of the IEEE International Conference on E-health Networking, 2024

End-to-End Decentralized Tracking of Carbon Footprint using Internet of Things and Distributed Databases.
Proceedings of the 7th Conference on Cloud and Internet of Things, 2024

2023
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
CoRR, 2023

Jailbreaker in Jail: Moving Target Defense for Large Language Models.
CoRR, 2023

TxT: Real-time Transaction Encapsulation for Ethereum Smart Contracts.
CoRR, 2023

2022
Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens.
CoRR, 2022

Et tu, Blockchain? Outsmarting Smart Contracts via Social Engineering.
CoRR, 2022

GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications.
Comput. Stand. Interfaces, 2021

Constraint-Based Inference of Heuristics for Foreign Exchange Trade Model Optimization.
CoRR, 2021

System-Wide Security for Offline Payment Terminals.
Proceedings of the Security and Privacy in Communication Networks, 2021

SoundFence: Securing Ultrasonic Sensors in Vehicles Using Physical-Layer Defense.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021

Rectifying Administrated ERC20 Tokens.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server.
Proceedings of the Database Systems for Advanced Applications, 2021

EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot.
Proceedings of the Security and Privacy in Communication Networks, 2020

SDR receiver using commodity wifi via physical-layer signal reconstruction.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020


  Loading...