Publications
Sorted by Publication Year. # means the co-firt author and * means the corresponding author(s).
Books
- Yan Meng, Haojin Zhu, and Xuemin (Sherman) Shen, Security in Smart Home Networks, Springer, Feb. 2023.
Journal Papers (Sorted by official publication date)
-
[ZTECom] From Function Calls to MCPs for Securing AI Agent Systems: Architecture, Challenges and Countermeasures
Wei Wang, Shaofeng Li, Tian Dong, Yan Meng, and Haojin Zhu
ZTE Communications,
Accepted.
-
[InfFus] AMF-VSN: Adaptive multi-process fusion video steganography based on invertible neural networks
Yangwen Zhang, Yuling Chen, Hui Dou, Yan Meng, and Haojin Zhu
Information Fusion,
vol. 121, pp. 103130, Sep. 2025.
-
[TIFS] Synergistic Multi-Modal Keystroke Eavesdropping in Virtual Reality With Vision and Wi-Fi
Jiachun Li, Yan Meng, Fazhong Liu, Tian Dong, Suguo Du, Guoxing Chen, Yuling Chen, and Haojin Zhu
IEEE Transactions on Information Forensics and Security, vol. 20, pp. 8387-8401, 2025.
Online publication date: Aug. 8, 2025
-
[TON]Collaborative Ad Fraud Detection in Ad Networks
Tong Zhu, Zhen Huang, Lu Zhou, Guoxing Chen, Yan Meng, and Haojin Zhu
IEEE Transactions on Networking,
vol. 33, no. 4, pp. 1779-1794, Aug. 2025.
-
[TITS]A Redactable Blockchain-Based Anonymous Announcement Scheme for VANETs
Yuxiang Yang, Yuling Chen, Zhiquan Liu, Yan Meng, Haiwei Sang
IEEE Transactions on Intelligent Transportation Systems,
vol. 26, no. 8, pp. 12417-12431, Aug. 2025.
-
[TDSC] A Magnetic Signal Based Device Fingerprinting Scheme in Wireless Charging
Jiachun Li, Yan Meng, Le Zhang, Guoxing Chen, Yuan Tian, and Haojin Zhu
IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 3, pp. 2943-2958, May-June 2025.
- [TDSC] Binary-level Formal Verification Based Automatic Security Ensurement for PLC in Industrial IoT
Xuankai Zhang, Jianhua Li, Jun Wu, Guoxing Chen, Yan Meng, Haojin Zhu and Xiao-song Zhang
IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 3, pp. 2211-2226, May-June 2025.
- [TMC] De-anonymizing Avatars in Virtual Reality: Attacks and Countermeasures
Yan Meng, Yuxia Zhan, Jiachun Li, Suguo Du, Haojin Zhu, and Xuemin (Sherman) Shen
IEEE Transactions on Mobile Computing, vol. 23, no. 12, pp. 13342-13357, Dec. 2024.
-
[JCRD]
Voice Interface Permission Control Based on Command Compliance Analysis
Zhexuan Chen, Fazhong Liu, Yan Meng, and Haojin Zhu
Journal of Information Security Research, vol. 10, no. 12, pp. 1144-1152, Dec. 2024
陈哲轩,刘发中,孟岩,朱浩瑾.基于指令合规分析的语音接口权限控制[J].信息安全研究,2024,10(12):1144-1152.
- [IoT-J] An HASM-Assisted Voice Disguise Scheme for Emotion Recognition of IoT-enabled Voice Interface
Wenjia Chen, Wenjuan Tang, Yan Meng, and Yaoxue Zhang
IEEE Internet of Things Journal, vol. 11, no. 22, pp. 36397-36409, 15 Nov.15, 2024.
- [TIFS] Dangers behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables
Jiachun Li, Yan Meng, Yuxia Zhan, Le Zhang, and Haojin Zhu
IEEE Transactions on Information Forensics and Security, vol. 19, pp. 8892-8907, 2024.
Online publication date: Sep. 20, 2024
- [TMC] Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability
Le Yu, Shufan Zhang, Yan Meng, Suguo Du, Yuling Chen, Yanli Ren, and Haojin Zhu
IEEE Transactions on Mobile Computing, vol. 23, no. 8, pp. 8256-8273, Aug. 2024.
- [TDSC] Privacy-preserving Liveness Detection for Securing Smart Voice Interfaces
Yan Meng, Jiachun Li, Yuan Tian, Haojin Zhu, and Jiming Chen
IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 4, pp. 2900-2916, July-Aug. 2024.
- [TVT] Secure and Efficient UAV Tracking in Space-air-ground Integrated Network
Jiachun Li, Weijiong Zhang, Yan Meng, Shaofeng Li, Lichuan Ma, Zhen Liu, and Haojin Zhu
IEEE Transactions on Vehicular Technology, vol. 72, no. 8, pp. 10682-10695, Aug. 2023.
-
[TII]
A Federated Learning based Privacy-preserving Smart Healthcare System
Jiachun Li, Yan Meng, Lichuan Ma, Suguo Du, Haojin Zhu, Qingqi Pei, and Xuemin (Sherman) Shen
IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 2021-2031, March, 2022
-
[JISA]
WiCapose: Multi-modal fusion based transparent authentication in mobile environments
Zhuo Chang, Yan Meng, Wenyuan Liu, Haojin Zhu, and Lin Wang
Journal of Information Security and Applications, vol. 66, March, 2022
-
[TDSC]
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment
Yan Meng, Haojin Zhu, Jinlei Li, Jin Li, Yao Liu
IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 6, pp. 2996-3011, 01 Nov.-Dec. 2021
-
[IoT-J]
Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications
Yiting Qu, Suguo Du, Shaofeng Li, Yan Meng, Le Zhang, Haojin Zhu
IEEE Internet of Things Journal, vol. 8, no. 9, pp. 7394-7406, 01 May, 2021
-
[TMC]
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures
Yan Meng, Jinlei Li, Haojin Zhu, Xiaohui Liang, Yao Liu, and Na Ruan
IEEE Transactions on Mobile Computing, vol. 19, no. 2, pp. 432-449, 01 February 2020
-
[JCRD]
Cyber Physical System Security of Smart Home Platform
Yan Meng, Shaofeng Li, Yichi Zhang, Haojin Zhu, and Xinpeng Zhang
Journal of Computer Research and Development, vol. 56, no. 11, pp. 2349-2364, Nov., 2019
孟岩,李少锋,张亦弛,朱浩瑾,张新鹏.面向智能家居平台的信息物理融合系统安全[J].计算机研究与发展,2019,56(11):2349-2364.
-
[IoT-J]
Edge-assisted Stream Scheduling Scheme for the Green-Communication-Based IoT
Licheng Wang, Yan Meng, Haojin Zhu, Minxing Tang, Kaoru Ota
IEEE Internet of Things Journal, vol. 6, no. 4, pp. 7282-7292, August 2019
-
[WCM]
Securing Consumer IoT in Smart Home: Architecture, Challenges and Countermeasures
Yan Meng, Wei Zhang, Haojin Zhu, Sherman (Xuemin) Shen
IEEE Wireless Communications, vol. 25, no. 6, pp. 53-59, Dec., 2018
Conference Papers (Sorted by conference date)
-
[CCS'25]
PipID: Light-Pupillary Response Based User Authentication for Virtual Reality
Muchen Pan, Yan Meng, Yuxia Zhan, Guoxing Chen, and Haojin Zhu
ACM Conference on Computer and Communication Security, Oct. 13-17, 2025.
-
[USENIX Security'25]
Depth Gives a False Sense of Privacy: LLM Internal States Inversion
Tian Dong, Yan Meng, Shaofeng Li, Guoxing Chen, Zhen Liu, and Haojin Zhu
USENIX Security Symposium, Aug. 13-15, 2025.
- [ICCC'25]
Dissecting Privacy Management of Apps from Regional Comparison Perspective
Ke Tang, Junxian Li, Tian Dong, Yan Meng, and Haojin Zhu
IEEE/CIC International Conference on Communications in China, Aug. 10-13, 2025.
-
[EuroS&P'25]
Latte: Layered Attestation for Portable Enclaved Applications
Haoxuan Xu, Jia Xiang, Zhen Huang, Guoxing Chen, Yan Meng, and Haojin Zhu
IEEE 10th European Symposium on Security and Privacy, 30 June 2025 - 04 July 2025.
-
[NDSS'25]
The Philosopher's Stone: Trojaning Plugins of Large Language Models
Tian Dong, Minhui Xue, Guoxing Chen, Rayne Holland, Yan Meng, Shaofeng Li, Zhen Liu, and Haojin Zhu
Network and Distributed System Security, Feb. 23-28, 2025.
- [MSN'24] Inferring Activities and Profiles of Users Based on Trajectory Leakage in Mobile Ad Network
Zhiyong Liu, Le Yu, Tian Dong, Yan Meng, Shaofeng Li, Guoxing Chen, and Haojin Zhu
20th International Conference on Mobility, Sensing and Networking, Dec. 20-22, 2024.
-
[CCS'24]
VPVet: Vetting Privacy Policies of Virtual Reality Apps
Yuxia Zhan, Yan Meng, Lu Zhou, Yichang Xiong, Xiaokuan Zhang, Lichuan Ma, Guoxing Chen, Qingqi Pei, and Haojin Zhu
ACM Conference on Computer and Communication Security, Oct. 15-18, 2024.
-
[CCS'24]
Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications
Tong Zhu, Chaofan Shou, Zhen Huang, Guoxing Chen, Xiaokuan Zhang, Yan Meng, and Haojin Zhu
ACM Conference on Computer and Communication Security, Oct. 15-18, 2024.
-
[LAMPS'24]
Detection and Attribution of Diffusion Model of Character Animation Based on Spatio-Temporal Attention
Fazhong Liu, Yan Meng, Tian Dong, Guoxing Chen, and Haojin Zhu
ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis (Colocated with CCS),
Oct. 15-18, 2024.
- [ICCC'24] BrInstFlip: A Universal Tool for Attacking DNN-Based Power Line Fault Detection Models
Yixin Jiang, Yanbo Xu, Zhihong Liang, Wenqian Xu, Tian Dong, Ximing Zhang, Yiwei Yang, Yan Meng and Haojin Zhu
IEEE/CIC International Conference on Communications in China, Aug. 7-9, 2024.
Best Paper Award
- [ICCC'24] FP-OCS: A Fingerprint Based Ownership Detection System for Insulator Fault Detection Model
Wenqian Xu, Fazhong Liu, Ximing Zhang, Yixin Jiang, Tian Dong, Zhihong Liang, Yiwei Yang, Yan Meng, and Haojin Zhu
IEEE/CIC International Conference on Communications in China, Aug. 7-9, 2024.
- [ICCC'24 Workshop] Backdoor Detection in Digital Twin-Driven Smart Grid via Contribution Analysis
Peiming Xu, Peilin Luo, Yixin Jiang, Tian Dong, Zhihong Liang, Fazhong Liu, Yan Meng, and Haojin Zhu
IEEE/CIC International Conference on Communications in China, Aug. 7-9, 2024.
- [ICMC'24] Security and Privacy in Virtual Reality: Challenges, Trends, and Countermeasures
Jiachun Li, Yan Meng, and Haojin Zhu
2024 International Conference on Meta Computing (ICMC), Jun. 20-23, 2024.
- [WASA'24] DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification
Hongliang Yong, Le Yu, Tian Dong, Yan Meng, Guoxing Chen, and Haojin Zhu
Wireless Artificial Intelligent Computing Systems and Applications, Jun. 20-23, 2024.
- [Globecom'23] Understanding and Identifying Cross-platform UI Framework based Potentially Unwanted Apps
Yichi Zhang, Guoxing Chen, Yan Meng, and Haojin Zhu
IEEE Global Communications Conference, Dec. 4-8, 2023
Paper
- [Globecom'23] Privacy Computing with Right to Be Forgotten in Trusted Execution Environment
Hui Liu, Hongzhi Luo, Shaofeng Li, Tian Dong, Guoxing Chen, Yan Meng, and Haojin Zhu
IEEE Global Communications Conference, Dec. 4-8, 2023
Paper
- [NSE'23] Poisoning Attack in Machine Learning Based Invalid Ad Traffic Detection
Le Yu, Shaofeng Li, Yan Meng, Xiao Wang and Haojin Zhu
The 2nd International Conference on Network Simulation and Evaluation, Nov. 22-24, 2023
- [ICCC'23] GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis
Yan Meng, Jiachun Li, Fazhong Liu, Shaofeng Li, Haotian Hu, and Haojin Zhu
IEEE/CIC International Conference on Communications in China, Aug. 10-12, 2023
Paper
- [ICCC'23] EM-Whisperer: A Voice Injection Attack via Powerline for Virtual Meeting Scenarios
Jiachun Li, Yan Meng*, Le Zhang, Fazhong Liu, and Haojin Zhu*
IEEE/CIC International Conference on Communications in China, Aug. 10-12, 2023
Paper
- [TURC'23] Wireless Traffic Analysis Based Side-channel Attacks and Countermeasure in Smart Home
Yan Meng, and Haojin Zhu
ACM Turing Award Celebration Conference - China 2023, July 28 - 30, 2023
-
[ICC'23]
Data Poisoning Attack against Anomaly Detectors in Digital Twin-based Networks
Shaofeng Li, Wen Wu, Yan Meng, Jiachun Li, Haojin Zhu, and Xuemin (Sherman) Shen
IEEE International Conference on Communications, May 28 - June 1, 2023
Paper
- [INFOCOM'23] De-anonymization Attacks on Metaverse
Yan Meng, Yuxia Zhan, Jiachun Li, Suguo Du, Haojin Zhu, and Xuemin (Sherman) Shen
IEEE International Conference on Computer Communications, May 17-20, 2023
Paper, Slides
- [INFOCOM'23] MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging
Jiachun Li, Yan Meng, Le Zhang, Guoxing Chen, Yuan Tian, Haojin Zhu, and Xuemin (Sherman) Shen
IEEE International Conference on Computer Communications, May 17-20, 2023
Paper
- [INFOCOM'23 Poster] Vetting Privacy Policies in VR: A Data Minimization Principle Perspective
Yuxia Zhan, Yan Meng, Lu Zhou, and Haojin Zhu
IEEE International Conference on Computer Communications, May 17-20, 2023
Best Poster Award
Paper, Slides
-
[USENIX Security'22]
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers
Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, and Yuan Tian
USENIX Security Symposium, August 10-12, 2022
Paper
-
[ICDCS'22]
Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing
Le Yu, Shufan Zhang, Lu Zhou, Yan Meng, Suguo Du, and Haojin Zhu
IEEE International Conference on Distributed Computing Systems, July 10-13, 2022
Paper
-
[CCS'21]
Dissecting Click Fraud Autonomy in the Wild
Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, and Haojin Zhu
ACM Conference on Computer and Communication Security, Nov. 15-19, 2021
Paper
-
[CCS'21 Poster]
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures
Brandon Falk, Yan Meng, Yuxia Zhan, and Haojin Zhu
ACM Conference on Computer and Communication Security, Nov. 15-19, 2021
Paper
-
[ICPADS'20]
Securing App Behaviors in Smart Home: A Human-App Interaction Perspective
Jinlei Li, Yan Meng, Lu Zhou and Haojin Zhu
IEEE International Conference on Parallel and Distributed Systems, Dec. 2-4, 2020
Paper
-
[INFOCOM'20]
Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home
Lei Zhang, Yan Meng, Jiahao Yu, Chong Xiang, Brandon Falk, Haojin Zhu
IEEE International Conference on Computer Communications, Jul. 6-9, 2020
Paper
-
[BigData'19]
An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts
Peilin Wu, Jinlei, Li, Yan Meng, and Haojin Zhu
IEEE International Conference on Big Data, Dec. 9-12, 2019
Paper
-
[Globecom'18]
Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism
Zichang Wang, Fei Guo, Yan Meng, Huaxin Li, Haojin Zhu, Zhenfu Cao
IEEE Global Communications Conference, Dec. 9-13, 2018
Paper
-
[CCS'18]
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic
Wei Zhang#, Yan Meng# , Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang and Haojin Zhu
ACM Conference on Computer and Communication Security, Oct. 15-18, 2018
Paper
-
[MobiHoc'18]
WiVo: Enhancing the Security of Voice Control System viaWireless Signal in IoT Environment
Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, Yao Liu
ACM International Symposium on Mobile Ad Hoc Networking and Computing, Jun. 26-29, 2018
Paper
-
[CCS'16]
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, and Na Ruan
ACM Conference on Computer and Communication Security, Oct. 24-28, 2016
Paper
-
[SocialSec'15]
Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach
Jiawen Peng, Yan Meng, Minhui Xue, Xiaojun Hei, and Keith Ross
International Symposium on Security and Privacy in Social Networks and Big Data, Nov. 16-18, 2015
Best Paper Award
Paper