Yan

Publications

Sorted by Publication Year. # means the co-firt author and * means the corresponding author(s).

Books
  1. Yan Meng, Haojin Zhu, and Xuemin (Sherman) Shen, Security in Smart Home Networks, Springer, Feb. 2023.
Journal Papers (Sorted by official publication date)

  1. [ZTECom] From Function Calls to MCPs for Securing AI Agent Systems: Architecture, Challenges and Countermeasures
    Wei Wang, Shaofeng Li, Tian Dong, Yan Meng, and Haojin Zhu
    ZTE Communications, Accepted.

  2. [InfFus] AMF-VSN: Adaptive multi-process fusion video steganography based on invertible neural networks
    Yangwen Zhang, Yuling Chen, Hui Dou, Yan Meng, and Haojin Zhu
    Information Fusion, vol. 121, pp. 103130, Sep. 2025.

  3. [TIFS] Synergistic Multi-Modal Keystroke Eavesdropping in Virtual Reality With Vision and Wi-Fi
    Jiachun Li, Yan Meng, Fazhong Liu, Tian Dong, Suguo Du, Guoxing Chen, Yuling Chen, and Haojin Zhu
    IEEE Transactions on Information Forensics and Security, vol. 20, pp. 8387-8401, 2025.
    Online publication date: Aug. 8, 2025

  4. [TON]Collaborative Ad Fraud Detection in Ad Networks
    Tong Zhu, Zhen Huang, Lu Zhou, Guoxing Chen, Yan Meng, and Haojin Zhu
    IEEE Transactions on Networking, vol. 33, no. 4, pp. 1779-1794, Aug. 2025.

  5. [TITS]A Redactable Blockchain-Based Anonymous Announcement Scheme for VANETs
    Yuxiang Yang, Yuling Chen, Zhiquan Liu, Yan Meng, Haiwei Sang
    IEEE Transactions on Intelligent Transportation Systems, vol. 26, no. 8, pp. 12417-12431, Aug. 2025.

  6. [TDSC] A Magnetic Signal Based Device Fingerprinting Scheme in Wireless Charging
    Jiachun Li, Yan Meng, Le Zhang, Guoxing Chen, Yuan Tian, and Haojin Zhu
    IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 3, pp. 2943-2958, May-June 2025.

  7. [TDSC] Binary-level Formal Verification Based Automatic Security Ensurement for PLC in Industrial IoT
    Xuankai Zhang, Jianhua Li, Jun Wu, Guoxing Chen, Yan Meng, Haojin Zhu and Xiao-song Zhang
    IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 3, pp. 2211-2226, May-June 2025.

  8. [TMC] De-anonymizing Avatars in Virtual Reality: Attacks and Countermeasures
    Yan Meng, Yuxia Zhan, Jiachun Li, Suguo Du, Haojin Zhu, and Xuemin (Sherman) Shen
    IEEE Transactions on Mobile Computing, vol. 23, no. 12, pp. 13342-13357, Dec. 2024.

  9. [JCRD] Voice Interface Permission Control Based on Command Compliance Analysis
    Zhexuan Chen, Fazhong Liu, Yan Meng, and Haojin Zhu
    Journal of Information Security Research, vol. 10, no. 12, pp. 1144-1152, Dec. 2024
    陈哲轩,刘发中,孟岩,朱浩瑾.基于指令合规分析的语音接口权限控制[J].信息安全研究,2024,10(12):1144-1152.

  10. [IoT-J] An HASM-Assisted Voice Disguise Scheme for Emotion Recognition of IoT-enabled Voice Interface
    Wenjia Chen, Wenjuan Tang, Yan Meng, and Yaoxue Zhang
    IEEE Internet of Things Journal, vol. 11, no. 22, pp. 36397-36409, 15 Nov.15, 2024.

  11. [TIFS] Dangers behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables
    Jiachun Li, Yan Meng, Yuxia Zhan, Le Zhang, and Haojin Zhu
    IEEE Transactions on Information Forensics and Security, vol. 19, pp. 8892-8907, 2024.
    Online publication date: Sep. 20, 2024

  12. [TMC] Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability
    Le Yu, Shufan Zhang, Yan Meng, Suguo Du, Yuling Chen, Yanli Ren, and Haojin Zhu
    IEEE Transactions on Mobile Computing, vol. 23, no. 8, pp. 8256-8273, Aug. 2024.

  13. [TDSC] Privacy-preserving Liveness Detection for Securing Smart Voice Interfaces
    Yan Meng, Jiachun Li, Yuan Tian, Haojin Zhu, and Jiming Chen
    IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 4, pp. 2900-2916, July-Aug. 2024.

  14. [TVT] Secure and Efficient UAV Tracking in Space-air-ground Integrated Network
    Jiachun Li, Weijiong Zhang, Yan Meng, Shaofeng Li, Lichuan Ma, Zhen Liu, and Haojin Zhu
    IEEE Transactions on Vehicular Technology, vol. 72, no. 8, pp. 10682-10695, Aug. 2023.

  15. [TII] A Federated Learning based Privacy-preserving Smart Healthcare System
    Jiachun Li, Yan Meng, Lichuan Ma, Suguo Du, Haojin Zhu, Qingqi Pei, and Xuemin (Sherman) Shen
    IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 2021-2031, March, 2022

  16. [JISA] WiCapose: Multi-modal fusion based transparent authentication in mobile environments
    Zhuo Chang, Yan Meng, Wenyuan Liu, Haojin Zhu, and Lin Wang
    Journal of Information Security and Applications, vol. 66, March, 2022

  17. [TDSC] Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment
    Yan Meng, Haojin Zhu, Jinlei Li, Jin Li, Yao Liu
    IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 6, pp. 2996-3011, 01 Nov.-Dec. 2021

  18. [IoT-J] Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications
    Yiting Qu, Suguo Du, Shaofeng Li, Yan Meng, Le Zhang, Haojin Zhu
    IEEE Internet of Things Journal, vol. 8, no. 9, pp. 7394-7406, 01 May, 2021

  19. [TMC] Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures
    Yan Meng, Jinlei Li, Haojin Zhu, Xiaohui Liang, Yao Liu, and Na Ruan
    IEEE Transactions on Mobile Computing, vol. 19, no. 2, pp. 432-449, 01 February 2020

  20. [JCRD] Cyber Physical System Security of Smart Home Platform
    Yan Meng, Shaofeng Li, Yichi Zhang, Haojin Zhu, and Xinpeng Zhang
    Journal of Computer Research and Development, vol. 56, no. 11, pp. 2349-2364, Nov., 2019
    孟岩,李少锋,张亦弛,朱浩瑾,张新鹏.面向智能家居平台的信息物理融合系统安全[J].计算机研究与发展,2019,56(11):2349-2364.

  21. [IoT-J] Edge-assisted Stream Scheduling Scheme for the Green-Communication-Based IoT
    Licheng Wang, Yan Meng, Haojin Zhu, Minxing Tang, Kaoru Ota
    IEEE Internet of Things Journal, vol. 6, no. 4, pp. 7282-7292, August 2019

  22. [WCM] Securing Consumer IoT in Smart Home: Architecture, Challenges and Countermeasures
    Yan Meng, Wei Zhang, Haojin Zhu, Sherman (Xuemin) Shen
    IEEE Wireless Communications, vol. 25, no. 6, pp. 53-59, Dec., 2018

Conference Papers (Sorted by conference date)

  1. [CCS'25] PipID: Light-Pupillary Response Based User Authentication for Virtual Reality
    Muchen Pan, Yan Meng, Yuxia Zhan, Guoxing Chen, and Haojin Zhu
    ACM Conference on Computer and Communication Security, Oct. 13-17, 2025.

  2. [USENIX Security'25] Depth Gives a False Sense of Privacy: LLM Internal States Inversion
    Tian Dong, Yan Meng, Shaofeng Li, Guoxing Chen, Zhen Liu, and Haojin Zhu
    USENIX Security Symposium, Aug. 13-15, 2025.

  3. [ICCC'25] Dissecting Privacy Management of Apps from Regional Comparison Perspective
    Ke Tang, Junxian Li, Tian Dong, Yan Meng, and Haojin Zhu
    IEEE/CIC International Conference on Communications in China, Aug. 10-13, 2025.

  4. [EuroS&P'25] Latte: Layered Attestation for Portable Enclaved Applications
    Haoxuan Xu, Jia Xiang, Zhen Huang, Guoxing Chen, Yan Meng, and Haojin Zhu
    IEEE 10th European Symposium on Security and Privacy, 30 June 2025 - 04 July 2025.

  5. [NDSS'25] The Philosopher's Stone: Trojaning Plugins of Large Language Models
    Tian Dong, Minhui Xue, Guoxing Chen, Rayne Holland, Yan Meng, Shaofeng Li, Zhen Liu, and Haojin Zhu
    Network and Distributed System Security, Feb. 23-28, 2025.

  6. [MSN'24] Inferring Activities and Profiles of Users Based on Trajectory Leakage in Mobile Ad Network
    Zhiyong Liu, Le Yu, Tian Dong, Yan Meng, Shaofeng Li, Guoxing Chen, and Haojin Zhu
    20th International Conference on Mobility, Sensing and Networking, Dec. 20-22, 2024.

  7. [CCS'24] VPVet: Vetting Privacy Policies of Virtual Reality Apps
    Yuxia Zhan, Yan Meng, Lu Zhou, Yichang Xiong, Xiaokuan Zhang, Lichuan Ma, Guoxing Chen, Qingqi Pei, and Haojin Zhu
    ACM Conference on Computer and Communication Security, Oct. 15-18, 2024.

  8. [CCS'24] Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications
    Tong Zhu, Chaofan Shou, Zhen Huang, Guoxing Chen, Xiaokuan Zhang, Yan Meng, and Haojin Zhu
    ACM Conference on Computer and Communication Security, Oct. 15-18, 2024.

  9. [LAMPS'24] Detection and Attribution of Diffusion Model of Character Animation Based on Spatio-Temporal Attention
    Fazhong Liu, Yan Meng, Tian Dong, Guoxing Chen, and Haojin Zhu
    ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis (Colocated with CCS), Oct. 15-18, 2024.

  10. [ICCC'24] BrInstFlip: A Universal Tool for Attacking DNN-Based Power Line Fault Detection Models
    Yixin Jiang, Yanbo Xu, Zhihong Liang, Wenqian Xu, Tian Dong, Ximing Zhang, Yiwei Yang, Yan Meng and Haojin Zhu
    IEEE/CIC International Conference on Communications in China, Aug. 7-9, 2024.
    Best Paper Award

  11. [ICCC'24] FP-OCS: A Fingerprint Based Ownership Detection System for Insulator Fault Detection Model
    Wenqian Xu, Fazhong Liu, Ximing Zhang, Yixin Jiang, Tian Dong, Zhihong Liang, Yiwei Yang, Yan Meng, and Haojin Zhu
    IEEE/CIC International Conference on Communications in China, Aug. 7-9, 2024.

  12. [ICCC'24 Workshop] Backdoor Detection in Digital Twin-Driven Smart Grid via Contribution Analysis
    Peiming Xu, Peilin Luo, Yixin Jiang, Tian Dong, Zhihong Liang, Fazhong Liu, Yan Meng, and Haojin Zhu
    IEEE/CIC International Conference on Communications in China, Aug. 7-9, 2024.

  13. [ICMC'24] Security and Privacy in Virtual Reality: Challenges, Trends, and Countermeasures
    Jiachun Li, Yan Meng, and Haojin Zhu
    2024 International Conference on Meta Computing (ICMC), Jun. 20-23, 2024.

  14. [WASA'24] DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification
    Hongliang Yong, Le Yu, Tian Dong, Yan Meng, Guoxing Chen, and Haojin Zhu
    Wireless Artificial Intelligent Computing Systems and Applications, Jun. 20-23, 2024.

  15. [Globecom'23] Understanding and Identifying Cross-platform UI Framework based Potentially Unwanted Apps
    Yichi Zhang, Guoxing Chen, Yan Meng, and Haojin Zhu
    IEEE Global Communications Conference, Dec. 4-8, 2023
    Paper

  16. [Globecom'23] Privacy Computing with Right to Be Forgotten in Trusted Execution Environment
    Hui Liu, Hongzhi Luo, Shaofeng Li, Tian Dong, Guoxing Chen, Yan Meng, and Haojin Zhu
    IEEE Global Communications Conference, Dec. 4-8, 2023
    Paper

  17. [NSE'23] Poisoning Attack in Machine Learning Based Invalid Ad Traffic Detection
    Le Yu, Shaofeng Li, Yan Meng, Xiao Wang and Haojin Zhu
    The 2nd International Conference on Network Simulation and Evaluation, Nov. 22-24, 2023

  18. [ICCC'23] GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis
    Yan Meng, Jiachun Li, Fazhong Liu, Shaofeng Li, Haotian Hu, and Haojin Zhu
    IEEE/CIC International Conference on Communications in China, Aug. 10-12, 2023
    Paper

  19. [ICCC'23] EM-Whisperer: A Voice Injection Attack via Powerline for Virtual Meeting Scenarios
    Jiachun Li, Yan Meng*, Le Zhang, Fazhong Liu, and Haojin Zhu*
    IEEE/CIC International Conference on Communications in China, Aug. 10-12, 2023
    Paper

  20. [TURC'23] Wireless Traffic Analysis Based Side-channel Attacks and Countermeasure in Smart Home
    Yan Meng, and Haojin Zhu
    ACM Turing Award Celebration Conference - China 2023, July 28 - 30, 2023

  21. [ICC'23] Data Poisoning Attack against Anomaly Detectors in Digital Twin-based Networks
    Shaofeng Li, Wen Wu, Yan Meng, Jiachun Li, Haojin Zhu, and Xuemin (Sherman) Shen
    IEEE International Conference on Communications, May 28 - June 1, 2023
    Paper

  22. [INFOCOM'23] De-anonymization Attacks on Metaverse
    Yan Meng, Yuxia Zhan, Jiachun Li, Suguo Du, Haojin Zhu, and Xuemin (Sherman) Shen
    IEEE International Conference on Computer Communications, May 17-20, 2023
    Paper, Slides

  23. [INFOCOM'23] MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging
    Jiachun Li, Yan Meng, Le Zhang, Guoxing Chen, Yuan Tian, Haojin Zhu, and Xuemin (Sherman) Shen
    IEEE International Conference on Computer Communications, May 17-20, 2023
    Paper

  24. [INFOCOM'23 Poster] Vetting Privacy Policies in VR: A Data Minimization Principle Perspective
    Yuxia Zhan, Yan Meng, Lu Zhou, and Haojin Zhu
    IEEE International Conference on Computer Communications, May 17-20, 2023
    Best Poster Award
    Paper, Slides

  25. [USENIX Security'22] Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers
    Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, and Yuan Tian
    USENIX Security Symposium, August 10-12, 2022
    Paper

  26. [ICDCS'22] Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing
    Le Yu, Shufan Zhang, Lu Zhou, Yan Meng, Suguo Du, and Haojin Zhu
    IEEE International Conference on Distributed Computing Systems, July 10-13, 2022
    Paper

  27. [CCS'21] Dissecting Click Fraud Autonomy in the Wild
    Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, and Haojin Zhu
    ACM Conference on Computer and Communication Security, Nov. 15-19, 2021
    Paper

  28. [CCS'21 Poster] POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures
    Brandon Falk, Yan Meng, Yuxia Zhan, and Haojin Zhu
    ACM Conference on Computer and Communication Security, Nov. 15-19, 2021
    Paper

  29. [ICPADS'20] Securing App Behaviors in Smart Home: A Human-App Interaction Perspective
    Jinlei Li, Yan Meng, Lu Zhou and Haojin Zhu
    IEEE International Conference on Parallel and Distributed Systems, Dec. 2-4, 2020
    Paper

  30. [INFOCOM'20] Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home
    Lei Zhang, Yan Meng, Jiahao Yu, Chong Xiang, Brandon Falk, Haojin Zhu
    IEEE International Conference on Computer Communications, Jul. 6-9, 2020
    Paper

  31. [BigData'19] An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts
    Peilin Wu, Jinlei, Li, Yan Meng, and Haojin Zhu
    IEEE International Conference on Big Data, Dec. 9-12, 2019
    Paper

  32. [Globecom'18] Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism
    Zichang Wang, Fei Guo, Yan Meng, Huaxin Li, Haojin Zhu, Zhenfu Cao
    IEEE Global Communications Conference, Dec. 9-13, 2018
    Paper

  33. [CCS'18] HoMonit: Monitoring Smart Home Apps from Encrypted Traffic
    Wei Zhang#, Yan Meng# , Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang and Haojin Zhu
    ACM Conference on Computer and Communication Security, Oct. 15-18, 2018
    Paper

  34. [MobiHoc'18] WiVo: Enhancing the Security of Voice Control System viaWireless Signal in IoT Environment
    Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, Yao Liu
    ACM International Symposium on Mobile Ad Hoc Networking and Computing, Jun. 26-29, 2018
    Paper

  35. [CCS'16] When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
    Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, and Na Ruan
    ACM Conference on Computer and Communication Security, Oct. 24-28, 2016
    Paper

  36. [SocialSec'15] Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach
    Jiawen Peng, Yan Meng, Minhui Xue, Xiaojun Hei, and Keith Ross
    International Symposium on Security and Privacy in Social Networks and Big Data, Nov. 16-18, 2015
    Best Paper Award
    Paper