Yan

Publications

Sorted by Publication Year. * means the co-first author.

Books
  1. Yan Meng, Haojin Zhu, and Xuemin (Sherman) Shen, Security in Smart Home Networks, Springer, Feb. 2023.
2023
  1. Yan Meng, Yuxia Zhan, Jiachun Li, Suguo Du, Haojin Zhu, and Xuemin (Sherman) Shen, "De-anonymization Attacks on Metaverse," accepted by IEEE INFOCOM 2023, 2023.
  2. Jiachun Li, Yan Meng, Le Zhang, Guoxing Chen, Yuan Tian, Haojin Zhu, and Xuemin (Sherman) Shen, "MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging," accepted by IEEE INFOCOM 2023, 2023.
  3. Shaofeng Li, Wen Wu, Yan Meng, Jiachun Li, Haojin Zhu, and Xuemin (Sherman) Shen, "Data Poisoning Attack against Anomaly Detectors in Digital Twin-based Networks," accepted by IEEE International Conference on Communications (ICC'23), 2023.
  4. Jiachun Li, Weijiong Zhang, Yan Meng, Shaofeng Li, Lichuan Ma, Zhen Liu, and Haojin Zhu, "Secure and Efficient UAV Tracking in Space-air-ground Integrated Network," IEEE Transactions on Vehicular Technology (TVT), to appear, 2023.
2022
  1. Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, and Yuan Tian, "Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers," the 31st USENIX Security Symposium (USENIX Security'22), pp. 1077-1094, 2022.
  2. Jiachun Li, Yan Meng, Lichuan Ma, Suguo Du, Haojin Zhu, Qingqi Pei, and Xuemin (Sherman) Shen, "A Federated Learning based Privacy-preserving Smart Healthcare System," IEEE Transactions on Industrial Informatics (TII), vol. 18, no. 3, pp. 2021-2031, 2022.
  3. Zhuo Chang, Yan Meng, Wenyuan Liu, Haojin Zhu, and Lin Wang, "WiCapose: Multi-modal fusion based transparent authentication in mobile environments," Journal of Information Security and Applications (JISA), vol. 66, 2022.
  4. Le Yu, Shufan Zhang, Lu Zhou, Yan Meng, Suguo Du, and Haojin Zhu, "Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing," accepted by IEEE International Conference on Distributed Computing Systems (ICDCS), 2022.
2021
  1. Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, and Haojin Zhu, "Dissecting Click Fraud Autonomy in the Wild," in the 28th ACM Conference on Computer and Communication Security (CCS'21), pp. 271-286, 2021.
  2. Brandon Falk, Yan Meng, Yuxia Zhan, and Haojin Zhu, "POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures," in the 28th ACM Conference on Computer and Communication Security (CCS'21), pp. 2405-2407, 2021.
2020
  1. Lei Zhang, Yan Meng, Jiahao Yu, Chong Xiang, Brandon Falk, Haojin Zhu, "Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home," in the IEEE Conference on Computer Communications (INFOCOM'20), pp.377-386, 2020.
  2. Jinlei Li, Yan Meng, Lu Zhou and Haojin Zhu, "Securing App Behaviors in Smart Home: A Human-App Interaction Perspective", in the 26th IEEE International Conference on Parallel and Distributed Systems (ICPADS'20) , pp. 308-315, 2020.
2019
  1. Peilin Wu, Jinlei, Li, Yan Meng, and Haojin Zhu, "An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts," IEEE International Conference on Big Data (BigData'19), pp. 5937-5944, 2019.
  2. Wei Zhang*, Yan Meng* (co-first authors), Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang and Haojin Zhu, "HoMonit: Monitoring Smart Home Apps from Encrypted Traffic," in the 25th ACM Conference on Computer and Communication Security (CCS'18), pp. 1074-1088, 2018.
2018
  1. Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, Yao Liu, "WiVo: Enhancing the Security of Voice Control System viaWireless Signal in IoT Environment," in the 19th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'18), pp. 81-90, 2018.
  2. Zichang Wang, Fei Guo, Yan Meng, Huaxin Li, Haojin Zhu, Zhenfu Cao, "Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism," in IEEE Global Communications Conference (Globecom'18), pp. 1-7, 2018.
Before 2017
  1. Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, and Na Ruan, "When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals," in the 23rd ACM Conference on Computer and Communication Security (CCS'16), pp. 1068–1079, 2016.
  2. Jiawen Peng, Yan Meng, Minhui Xue, Xiaojun Hei, and Keith Ross, "Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach," in 2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec'15), pp. 64-71, 2015. (Best Paper Award)