Yan Meng
Orcid: 0000-0001-5445-0347Affiliations:
- Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
According to our database1,
Yan Meng
authored at least 51 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Intell. Transp. Syst., August, 2025
CoRR, July, 2025
Step-wise Adaptive Integration of Supervised Fine-tuning and Reinforcement Learning for Task-Specific LLMs.
CoRR, May, 2025
Model Inversion in Split Learning for Personalized LLMs: New Insights from Information Bottleneck Theory.
CoRR, January, 2025
Synergistic Multi-Modal Keystroke Eavesdropping in Virtual Reality With Vision and Wi-Fi.
IEEE Trans. Inf. Forensics Secur., 2025
Binary-Level Formal Verification Based Automatic Security Ensurement for PLC in Industrial IoT.
IEEE Trans. Dependable Secur. Comput., 2025
IEEE Trans. Dependable Secur. Comput., 2025
AMF-VSN: Adaptive multi-process fusion video steganography based on invertible neural networks.
Inf. Fusion, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025
2024
IEEE Trans. Mob. Comput., December, 2024
An HASM-Assisted Voice Disguise Scheme for Emotion Recognition of IoT-Enabled Voice Interface.
IEEE Internet Things J., November, 2024
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability.
IEEE Trans. Mob. Comput., August, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
Inferring Activities and Profiles of Users Based on Trajectory Leakage in Mobile Ad Network.
Proceedings of the 20th International Conference on Mobility, Sensing and Networking, 2024
Detection and Attribution of Diffusion Model of Character Animation Based on Spatio-Temporal Attention.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Veh. Technol., August, 2023
Wireless Networks, Springer, ISBN: 978-3-031-24184-0, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Understanding and Identifying Cross-Platform UI Framework Based Potentially Unwanted Apps.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Wireless Traffic Analysis Based Side-channel Attacks and Countermeasure in Smart Home.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
2022
IEEE Trans. Ind. Informatics, 2022
WiCapose: Multi-modal fusion based transparent authentication in mobile environments.
J. Inf. Secur. Appl., 2022
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.
Proceedings of the 31st USENIX Security Symposium, 2022
Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications.
IEEE Internet Things J., 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Mob. Comput., 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
2019
IEEE Internet Things J., 2019
An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Securing Consumer IoT in the Smart Home: Architecture, Challenges, and Countermeasures.
IEEE Wirel. Commun., 2018
WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015