Yan Wang

Orcid: 0000-0002-3984-6973

Affiliations:
  • Temple University, Philadelphia, PA, USA
  • Binghamton University, NY, USA (former)
  • Stevens Institute of Technology, Department of Electrical and Computer Engineering, Hoboken, NJ, USA (PhD 2015)


According to our database1, Yan Wang authored at least 78 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models.
CoRR, 2024

2023
Passive Vital Sign Monitoring via Facial Vibrations Leveraging AR/VR Headsets.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

BioCase: Privacy Protection via Acoustic Sensing of Finger Touches on Smartphone Case Mini-Structures.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

EarCase: Sound Source Localization Leveraging Mini Acoustic Structure Equipped Phone Cases for Hearing-challenged People.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Phone-based CSI Hand Gesture Recognition with Lightweight Image-Classification Model.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Universal Targeted Adversarial Attacks Against mmWave-based Human Activity Recognition.
Proceedings of the IEEE INFOCOM 2023, 2023

EmoLeak: Smartphone Motions Reveal Emotions.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Stealthy Backdoor Attack on RF Signal Classification.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Secure and Efficient Mobile DNN Using Trusted Execution Environments.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
A Survey of Deep Learning on Mobile Devices: Applications, Optimizations, Challenges, and Research Opportunities.
Proc. IEEE, 2022

Robust Continuous Authentication Using Cardiac Biometrics From Wrist-Worn Wearables.
IEEE Internet Things J., 2022

EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers.
CoRR, 2022

Solving the WiFi Sensing Dilemma in Reality Leveraging Conformal Prediction.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Personalized health monitoring via vital sign measurements leveraging motion sensors on AR/VR headsets.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Universal targeted attacks against mmWave-based human activity recognition system.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Continuous blood pressure monitoring using low-cost motion sensors on AR/VR headsets.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

BioTag: robust RFID-based continuous user verification using physiological features from respiration.
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022

Audio-domain position-independent backdoor attack via unnoticeable triggers.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

mmFit: Low-Effort Personalized Fitness Monitoring Using Millimeter Wave.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
Towards Low-Cost Sign Language Gesture Recognition Leveraging Wearables.
IEEE Trans. Mob. Comput., 2021

Authentication of Voice Commands by Leveraging Vibrations in Wearables.
IEEE Secur. Priv., 2021

WatchID: Wearable Device Authentication via Reprogrammable Vibration.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021

WiFi-based Contactless Gesture Recognition Using Lightweight CNN.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Environment-independent In-baggage Object Identification Using WiFi Signals.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Bipartite Graph Matching Based Secret Key Generation.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

MIXP: Efficient Deep Neural Networks Pruning for Further FLOPs Compression via Neuron Bond.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity.
CoRR, 2020

EchoLock: Towards Low Effort Mobile User Identification.
CoRR, 2020

Wireless Sensing for Human Activity: A Survey.
IEEE Commun. Surv. Tutorials, 2020

User authentication on mobile devices: Approaches, threats and trends.
Comput. Networks, 2020

TrueHeart: Continuous Authentication on Wrist-worn Wearables Using PPG-based Biometrics.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

LiveScreen: Video Chat Liveness Detection Leveraging Skin Reflection.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Continuous User Verification via Respiratory Biometrics.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Driver Identification Leveraging Single-turn Behaviors via Mobile Devices.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

EchoLock: Towards Low-effort Mobile User Identification Leveraging Structure-borne Echos.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Implications of smartphone user privacy leakage from the advertiser's perspective.
Pervasive Mob. Comput., 2019

Demo: Toward Continuous User Authentication Using PPG in Commodity Wrist-worn Wearables.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Poster: Video Chat Scam Detection Leveraging Screen Light Reflection.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2018
Personal PIN Leakage from Wearable Devices.
IEEE Trans. Mob. Comput., 2018

Authenticating Users Through Fine-Grained Channel Information.
IEEE Trans. Mob. Comput., 2018

Monitoring Vital Signs and Postures During Sleep Using WiFi Signals.
IEEE Internet Things J., 2018

Your Heart Won't Lie: PPG-based Continuous Authentication on Wrist-worn Wearable Devices.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Poster: Inferring Mobile Payment Passcodes Leveraging Wearable Devices.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Poster: Your Phone Tells Us The Truth: Driver Identification Using Smartphone on One Turn.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Poster: Leveraging Breathing for Continuous User Authentication.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

PPG-based Finger-level Gesture Recognition Leveraging Wearables.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Towards In-baggage Suspicious Object Detection Using Commodity WiFi.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
VibSense: Sensing Touches on Ubiquitous Surfaces through Vibration.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

BigRoad: Scaling Road Data Acquisition for Dependable Self-Driving.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

2016
Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors.
IEEE Trans. Mob. Comput., 2016

Towards safer texting while driving through stop time prediction.
Proceedings of the First ACM International Workshop on Smart, 2016

HearHere: smartphone based audio localization using time difference of arrival: demo.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Leveraging wearables for steering and driver tracking.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
A Low-Cost Wi-Fi-Based Solution for Measuring Human Queues.
GetMobile Mob. Comput. Commun., 2015

Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Snooping Keystrokes with mm-level Audio Ranging on a Single Phone.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Towards Understanding the Advertiser's Perspective of Smartphone User Privacy.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
Incentive Based Data Sharing in Delay Tolerant Mobile Networks.
IEEE Trans. Wirel. Commun., 2014

Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation.
IEEE Trans. Mob. Comput., 2014

Accurate WiFi Based Localization for Smartphones Using Peer Assistance.
IEEE Trans. Mob. Comput., 2014

Leveraging Wi-Fi Signals to Monitor Human Queues.
IEEE Pervasive Comput., 2014

Tracking human queues using single-point signal monitoring.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Practical user authentication leveraging channel state information (CSI).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Detection of On-Road Vehicles Emanating GPS Interference.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Sensing vehicle dynamics for determining driver phone use.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Measuring human queues using WiFi signals.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

2012
Push the limit of WiFi based localization for smartphones.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Incentive driven information sharing in delay tolerant mobile networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012


  Loading...