


default search action
Yan Meng 0001
Person information
- unicode name: 孟岩
- affiliation: Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
Other persons with the same name
- Yan Meng — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Wenjia Chen
, Wenjuan Tang
, Yan Meng
, Yaoxue Zhang:
An HASM-Assisted Voice Disguise Scheme for Emotion Recognition of IoT-Enabled Voice Interface. IEEE Internet Things J. 11(22): 36397-36409 (2024) - [j12]Yan Meng
, Jiachun Li
, Haojin Zhu
, Yuan Tian
, Jiming Chen
:
Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces. IEEE Trans. Dependable Secur. Comput. 21(4): 2900-2916 (2024) - [j11]Jiachun Li
, Yan Meng
, Yuxia Zhan
, Le Zhang, Haojin Zhu
:
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables. IEEE Trans. Inf. Forensics Secur. 19: 8892-8907 (2024) - [j10]Le Yu
, Shufan Zhang
, Yan Meng
, Suguo Du
, Yuling Chen
, Yanli Ren
, Haojin Zhu
:
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability. IEEE Trans. Mob. Comput. 23(8): 8256-8273 (2024) - [j9]Yan Meng
, Yuxia Zhan
, Jiachun Li
, Suguo Du
, Haojin Zhu
, Xuemin Shen
:
De-Anonymizing Avatars in Virtual Reality: Attacks and Countermeasures. IEEE Trans. Mob. Comput. 23(12): 13342-13357 (2024) - [c25]Yuxia Zhan
, Yan Meng
, Lu Zhou
, Yichang Xiong
, Xiaokuan Zhang
, Lichuan Ma
, Guoxing Chen
, Qingqi Pei
, Haojin Zhu
:
VPVet: Vetting Privacy Policies of Virtual Reality Apps. CCS 2024: 1746-1760 - [c24]Tong Zhu
, Chaofan Shou
, Zhen Huang
, Guoxing Chen
, Xiaokuan Zhang
, Yan Meng
, Shuang Hao
, Haojin Zhu
:
Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications. CCS 2024: 2963-2977 - [c23]Fazhong Liu
, Yan Meng
, Tian Dong
, Guoxing Chen
, Haojin Zhu
:
Detection and Attribution of Diffusion Model of Character Animation Based on Spatio-Temporal Attention. LAMPS@CCS 2024: 105-108 - [c22]Hongliang Yong, Le Yu, Tian Dong, Yan Meng, Guoxing Chen, Haojin Zhu:
DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification. WASA (2) 2024: 439-451 - [i3]Yuxia Zhan, Yan Meng, Lu Zhou, Yichang Xiong, Xiaokuan Zhang, Lichuan Ma, Guoxing Chen, Qingqi Pei, Haojin Zhu:
VPVet: Vetting Privacy Policies of Virtual Reality Apps. CoRR abs/2409.00740 (2024) - 2023
- [b1]Yan Meng
, Haojin Zhu
, Xuemin (Sherman) Shen
:
Security in Smart Home Networks. Wireless Networks, Springer 2023, ISBN 978-3-031-24184-0, pp. 1-166 - [j8]Jiachun Li
, Weijiong Zhang, Yan Meng
, Shaofeng Li, Lichuan Ma, Zhen Liu
, Haojin Zhu
:
Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network. IEEE Trans. Veh. Technol. 72(8): 10682-10695 (2023) - [c21]Yan Meng
, Haojin Zhu
:
Wireless Traffic Analysis Based Side-channel Attacks and Countermeasure in Smart Home. ACM TUR-C 2023: 150-151 - [c20]Hui Liu, Hongzhi Luo, Shaofeng Li, Tian Dong, Guoxing Chen, Yan Meng, Haojin Zhu:
Privacy Computing with Right to Be Forgotten in Trusted Execution Environment. GLOBECOM 2023: 2566-2571 - [c19]Yichi Zhang, Guoxing Chen, Yan Meng, Haojin Zhu:
Understanding and Identifying Cross-Platform UI Framework Based Potentially Unwanted Apps. GLOBECOM 2023: 6705-6710 - [c18]Shaofeng Li, Wen Wu, Yan Meng, Jiachun Li, Haojin Zhu, Xuemin Sherman Shen:
Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks. ICC 2023: 13-18 - [c17]Jiachun Li, Yan Meng, Le Zhang, Fazhong Liu, Haojin Zhu:
EM-Whisperer: A Voice Injection Attack via Powerline for Virtual Meeting Scenarios. ICCC 2023: 1-6 - [c16]Yan Meng, Jiachun Li, Fazhong Liu, Shaofeng Li, Haotian Hu, Haojin Zhu:
GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis. ICCC 2023: 1-6 - [c15]Jiachun Li, Yan Meng, Le Zhang, Guoxing Chen, Yuan Tian, Haojin Zhu, Xuemin Sherman Shen:
MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging. INFOCOM 2023: 1-10 - [c14]Yan Meng, Yuxia Zhan
, Jiachun Li, Suguo Du, Haojin Zhu, Xuemin Sherman Shen:
De-anonymization Attacks on Metaverse. INFOCOM 2023: 1-10 - [c13]Yuxia Zhan
, Yan Meng, Lu Zhou, Haojin Zhu:
Vetting Privacy Policies in VR: A Data Minimization Principle Perspective. INFOCOM Workshops 2023: 1-2 - [i2]Tian Dong, Guoxing Chen, Shaofeng Li, Minhui Xue, Rayne Holland, Yan Meng, Zhen Liu, Haojin Zhu:
Unleashing Cheapfakes through Trojan Plugins of Large Language Models. CoRR abs/2312.00374 (2023) - 2022
- [j7]Zhuo Chang
, Yan Meng, Wenyuan Liu, Haojin Zhu, Lin Wang
:
WiCapose: Multi-modal fusion based transparent authentication in mobile environments. J. Inf. Secur. Appl. 66: 103130 (2022) - [j6]Jiachun Li
, Yan Meng
, Lichuan Ma
, Suguo Du
, Haojin Zhu
, Qingqi Pei
, Xuemin Shen
:
A Federated Learning Based Privacy-Preserving Smart Healthcare System. IEEE Trans. Ind. Informatics 18(3): 2021-2031 (2022) - [c12]Le Yu, Shufan Zhang
, Lu Zhou, Yan Meng, Suguo Du, Haojin Zhu:
Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing. ICDCS 2022: 470-480 - [c11]Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian:
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers. USENIX Security Symposium 2022: 1077-1094 - 2021
- [j5]Yiting Qu
, Suguo Du
, Shaofeng Li
, Yan Meng
, Le Zhang, Haojin Zhu
:
Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications. IEEE Internet Things J. 8(9): 7394-7406 (2021) - [j4]Yan Meng
, Haojin Zhu
, Jinlei Li
, Jin Li
, Yao Liu
:
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment. IEEE Trans. Dependable Secur. Comput. 18(6): 2996-3011 (2021) - [c10]Tong Zhu
, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu:
Dissecting Click Fraud Autonomy in the Wild. CCS 2021: 271-286 - [c9]Brandon Falk, Yan Meng, Yuxia Zhan
, Haojin Zhu:
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures. CCS 2021: 2405-2407 - [i1]Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu:
Dissecting Click Fraud Autonomy in the Wild. CoRR abs/2105.11103 (2021) - 2020
- [j3]Yan Meng
, Jinlei Li
, Haojin Zhu
, Xiaohui Liang
, Yao Liu, Na Ruan:
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures. IEEE Trans. Mob. Comput. 19(2): 432-449 (2020) - [c8]Jinlei Li, Yan Meng, Lu Zhou, Haojin Zhu:
Securing App Behaviors in Smart Home: A Human-App Interaction Perspective. ICPADS 2020: 308-315 - [c7]Lei Zhang, Yan Meng, Jiahao Yu, Chong Xiang
, Brandon Falk, Haojin Zhu
:
Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home. INFOCOM 2020: 377-386
2010 – 2019
- 2019
- [j2]Licheng Wang
, Yan Meng
, Haojin Zhu
, Minxing Tang
, Kaoru Ota
:
Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT. IEEE Internet Things J. 6(4): 7282-7292 (2019) - [c6]Peilin Wu, Jinlei Li, Yan Meng, Haojin Zhu
:
An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts. IEEE BigData 2019: 5937-5944 - 2018
- [j1]Yan Meng, Wei Zhang, Haojin Zhu
, Xuemin Sherman Shen
:
Securing Consumer IoT in the Smart Home: Architecture, Challenges, and Countermeasures. IEEE Wirel. Commun. 25(6): 53-59 (2018) - [c5]Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu
:
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. CCS 2018: 1074-1088 - [c4]Zichang Wang, Fei Guo, Yan Meng, Huaxin Li, Haojin Zhu
, Zhenfu Cao:
Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism. GLOBECOM 2018: 1-7 - [c3]Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu
, Xiaohui Liang, Yao Liu:
WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment. MobiHoc 2018: 81-90 - 2016
- [c2]Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu
, Xiaohui Liang, Yao Liu, Na Ruan:
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. CCS 2016: 1068-1079 - 2015
- [c1]Jiawen Peng, Yan Meng, Minhui Xue
, Xiaojun Hei
, Keith W. Ross:
Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach. SocialSec 2015: 64-71
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 21:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint