关注
Chen Wang
标题
引用次数
引用次数
年份
Wireless sensing for human activity: A survey
J Liu, H Liu, Y Chen, Y Wang, C Wang
IEEE Communications Surveys & Tutorials 22 (3), 1629-1645, 2019
2802019
Friend or foe? Your wearable devices reveal your personal pin
C Wang, X Guo, Y Wang, Y Chen, B Liu
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
1632016
Fine-grained sleep monitoring: Hearing your breathing with smartphones
Y Ren, C Wang, J Yang, Y Chen
2015 IEEE Conference on Computer Communications (INFOCOM), 1194-1202, 2015
1292015
User authentication on mobile devices: Approaches, threats and trends
C Wang, Y Wang, Y Chen, H Liu, J Liu
Computer Networks 170, 107118, 2020
1142020
VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration
J Liu, C Wang, Y Chen, N Saxena
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
982017
Towards in-baggage suspicious object detection using commodity wifi
C Wang, J Liu, Y Chen, H Liu, Y Wang
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
692018
Locating rogue access point using fine-grained channel information
C Wang, X Zheng, Y Chen, J Yang
IEEE Transactions on Mobile Computing 16 (9), 2560-2573, 2016
452016
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations
C Wang, SA Anand, J Liu, P Walker, Y Chen, N Saxena
Proceedings of the 35th Annual Computer Security Applications Conference, 42-56, 2019
422019
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers
SA Anand, C Wang, J Liu, N Saxena, Y Chen
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
332021
Accurate rogue access point localization leveraging fine-grained channel information
X Zheng, C Wang, Y Chen, J Yang
2014 IEEE conference on communications and network security, 211-219, 2014
332014
Signature verification using critical segments for securing mobile transactions
Y Ren, C Wang, Y Chen, MC Chuah, J Yang
IEEE Transactions on Mobile Computing 19 (3), 724-739, 2019
312019
Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers
SA Anand, C Wang, J Liu, N Saxena, Y Chen
arXiv preprint arXiv:1907.05972, 2019
282019
Personal PIN leakage from wearable devices
C Wang, X Guo, Y Chen, Y Wang, B Liu
IEEE Transactions on Mobile Computing 17 (3), 646-660, 2017
282017
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training
C Shi, Y Wang, Y Chen, N Saxena, C Wang*
Annual Computer Security Applications Conference, 829-842, 2020
25*2020
Noninvasive fine-grained sleep monitoring leveraging smartphones
Y Ren, C Wang, Y Chen, J Yang, H Li
IEEE Internet of Things Journal 6 (5), 8248-8261, 2019
252019
Critical segment based real-time e-signature for securing mobile transactions
Y Ren, C Wang, Y Chen, MC Chuah, J Yang
2015 IEEE Conference on Communications and Network Security (CNS), 7-15, 2015
242015
Systems and methods for user input and authentication using vibration analysis
C YingYing, J Liu, C Wang, N Saxena
US Patent 11,461,442, 2022
232022
Wristspy: Snooping passcodes in mobile payment using wrist-worn wearables
C Wang, J Liu, X Guo, Y Wang, Y Chen
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2071-2079, 2019
222019
WiEat: Fine-grained device-free eating monitoring leveraging Wi-Fi signals
Z Lin, Y Xie, X Guo, Y Ren, Y Chen, C Wang
2020 29th International Conference on Computer Communications and Networks …, 2020
192020
Echovib: Exploring voice authentication via unique non-linear vibrations of short replayed speech
SA Anand, J Liu, C Wang, M Shirvanian, N Saxena, Y Chen
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
172021
系统目前无法执行此操作,请稍后再试。
文章 1–20