Yan Meng (孟岩)

Email: yan_meng at sjtu dot edu dot cn
Research Assistant Professor
Department of Computer Science & Engineering
Shanghai Jiao Tong University
Office Address: SEIEE 3-439, 800 Dongchuan Road, Shanghai, 200240, China
Working Address: SEIEE 3-335, 800 Dongchuan Road, Shanghai, 200240, China

Short Bios



  1. Yan Meng, Haojin Zhu, and Xuemin (Sherman) Shen, Security in Smart Home Networks, Springer, Feb. 2023.
Research Papers
Sorted by Publication Year. * means the co-first author.
  1. Yan Meng, Yuxia Zhan, Jiachun Li, Suguo Du, Haojin Zhu, and Xuemin (Sherman) Shen, "De-anonymization Attacks on Metaverse," accepted by IEEE INFOCOM 2023, 2023.
  2. Jiachun Li, Yan Meng, Le Zhang, Guoxing Chen, Yuan Tian, Haojin Zhu, and Xuemin (Sherman) Shen, "MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging," accepted by IEEE INFOCOM 2023, 2023.
  3. Jiachun Li, Weijiong Zhang, Yan Meng, Shaofeng Li, Lichuan Ma, Zhen Liu, and Haojin Zhu, "Secure and Efficient UAV Tracking in Space-air-ground Integrated Network," IEEE Transactions on Vehicular Technology (TVT), accepted, 2023.
  4. Shaofeng Li, Wen Wu, Yan Meng, Jiachun Li, Haojin Zhu, and Xuemin (Sherman) Shen, "Data Poisoning Attack against Anomaly Detectors in Digital Twin-based Networks," accepted by IEEE International Conference on Communications (ICC'23), 2023.
  5. Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, and Yuan Tian, "Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers," the 31st USENIX Security Symposium (USENIX Security'22), pp. 1077-1094, 2022.
  6. Jiachun Li, Yan Meng, Lichuan Ma, Suguo Du, Haojin Zhu, Qingqi Pei, and Xuemin (Sherman) Shen, "A Federated Learning based Privacy-preserving Smart Healthcare System," IEEE Transactions on Industrial Informatics (TII), vol. 18, no. 3, pp. 2021-2031, 2022.
  7. Zhuo Chang, Yan Meng, Wenyuan Liu, Haojin Zhu, and Lin Wang, "WiCapose: Multi-modal fusion based transparent authentication in mobile environments," Journal of Information Security and Applications (JISA), vol. 66, 2022.
  8. Le Yu, Shufan Zhang, Lu Zhou, Yan Meng, Suguo Du, and Haojin Zhu, "Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing," accepted by IEEE International Conference on Distributed Computing Systems (ICDCS), 2022.
  9. Yan Meng, Haojin Zhu, Jinlei Li, Jin Li, Yao Liu, "Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment," IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, no. 6, pp. 2996-3011, 2021.
  10. Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, and Haojin Zhu, "Dissecting Click Fraud Autonomy in the Wild," in the 28th ACM Conference on Computer and Communication Security (CCS'21), pp. 271-286, 2021.
  11. Brandon Falk, Yan Meng, Yuxia Zhan, and Haojin Zhu, "POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures," in the 28th ACM Conference on Computer and Communication Security (CCS'21), pp. 2405-2407, 2021.
  12. Yiting Qu, Suguo Du, Shaofeng Li, Yan Meng, Le Zhang, Haojin Zhu, "Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications," IEEE Internet of Things Journal (IoT-J), vol. 8, no. 9, pp. 7394-7406, 2021.
  13. Yan Meng, Jinlei Li, Haojin Zhu, Xiaohui Liang, Yao Liu, and Na Ruan, "Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures," IEEE Transactions on Mobile Computing (TMC), vol. 19, no. 2, pp. 432-449, 2020.
  14. Lei Zhang, Yan Meng, Jiahao Yu, Chong Xiang, Brandon Falk, Haojin Zhu, "Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home," in the IEEE Conference on Computer Communications (INFOCOM'20), pp.377-386, 2020.
  15. Jinlei Li, Yan Meng, Lu Zhou and Haojin Zhu, "Securing App Behaviors in Smart Home: A Human-App Interaction Perspective", in the 26th IEEE International Conference on Parallel and Distributed Systems (ICPADS'20) , pp. 308-315, 2020.
  16. Yan Meng, Shaofeng Li, Yichi Zhang, Haojin Zhu, and Xinpeng Zhang, "Cyber Physical System Security of Smart Home Platform," Journal of Computer Research and Development, vol. 56, no. 11, pp. 2349-2364, 2019. (Press in Chinese).
  17. Licheng Wang, Yan Meng, Haojin Zhu, Minxing Tang, Kaoru Ota, "Edge-assisted Stream Scheduling Scheme for the Green-Communication-Based IoT," IEEE Internet of Things Journal (IoT-J), vol. 6, no. 4, pp. 7282-7292, 2019.
  18. Peilin Wu, Jinlei, Li, Yan Meng, and Haojin Zhu, "An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts," IEEE International Conference on Big Data (BigData'19), pp. 5937-5944, 2019.
  19. Wei Zhang*, Yan Meng* (co-first authors), Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang and Haojin Zhu, "HoMonit: Monitoring Smart Home Apps from Encrypted Traffic," in the 25th ACM Conference on Computer and Communication Security (CCS'18), pp. 1074-1088, 2018.
  20. Yan Meng, Wei Zhang, Haojin Zhu, Sherman (Xuemin) Shen, "Securing Consumer IoT in Smart Home: Architecture, Challenges and Countermeasures," IEEE Wireless Communications (WCM), vol. 25, no. 6, pp. 53-59, 2018.
  21. Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, Yao Liu, "WiVo: Enhancing the Security of Voice Control System viaWireless Signal in IoT Environment," in the 19th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'18), pp. 81-90, 2018.
  22. Zichang Wang, Fei Guo, Yan Meng, Huaxin Li, Haojin Zhu, Zhenfu Cao, "Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism," in IEEE Global Communications Conference (Globecom'18), pp. 1-7, 2018.
  23. Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, and Na Ruan, "When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals," in the 23rd ACM Conference on Computer and Communication Security (CCS'16), pp. 1068–1079, 2016.
  24. Jiawen Peng, Yan Meng, Minhui Xue, Xiaojun Hei, and Keith Ross, "Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach," in 2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec'15), pp. 64-71, 2015. (Best Paper Award)

Honors and Awards

Professional Services