Homonit: Monitoring smart home apps from encrypted traffic W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 239 | 2018 |
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 218 | 2016 |
Securing consumer IoT in the smart home: Architecture, challenges, and countermeasures Y Meng, W Zhang, H Zhu, XS Shen IEEE Wireless Communications 25 (6), 53-59, 2018 | 153 | 2018 |
A federated learning based privacy-preserving smart healthcare system J Li, Y Meng, L Ma, S Du, H Zhu, Q Pei, X Shen IEEE Transactions on Industrial Informatics 18 (3), 2021-2031, 2022 | 111 | 2022 |
Wivo: Enhancing the security of voice control system via wireless signal in iot environment Y Meng, Z Wang, W Zhang, P Wu, H Zhu, X Liang, Y Liu Proceedings of the eighteenth ACM international symposium on mobile ad hoc …, 2018 | 88 | 2018 |
Voiceprint mimicry attack towards speaker verification system in smart home L Zhang, Y Meng, J Yu, C Xiang, B Falk, H Zhu IEEE INFOCOM 2020-IEEE conference on computer communications, 377-386, 2020 | 49 | 2020 |
Your microphone array retains your identity: A robust voice liveness detection system for smart speaker Y Meng, J Li, M Pillari, A Deopujari, L Brennan, H Shamsie, H Zhu, Y Tian USENIX Security, 1077-1094, 2022 | 42 | 2022 |
Liveness detection for voice user interface via wireless signals in iot environment Y Meng, H Zhu, J Li, J Li, Y Liu IEEE Transactions on Dependable and Secure Computing 18 (6), 2996-3011, 2021 | 38 | 2021 |
Revealing your mobile password via WiFi signals: Attacks and countermeasures Y Meng, J Li, H Zhu, X Liang, Y Liu, N Ruan IEEE Transactions on Mobile Computing 19 (2), 432-449, 2020 | 37 | 2020 |
Attacks and defenses in location-based social networks: a heuristic number theory approach J Peng, Y Meng, M Xue, X Hei, KW Ross 2015 International Symposium on Security and Privacy in Social Networks and …, 2015 | 16 | 2015 |
Automatic permission optimization framework for privacy enhancement of mobile applications Y Qu, S Du, S Li, Y Meng, L Zhang, H Zhu IEEE Internet of Things Journal 8 (9), 7394-7406, 2020 | 15 | 2020 |
Dissecting click fraud autonomy in the wild T Zhu, Y Meng, H Hu, X Zhang, M Xue, H Zhu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 12 | 2021 |
Poster: Reavatar: Virtual reality de-anonymization attack through correlating movement signatures B Falk, Y Meng, Y Zhan, H Zhu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 11 | 2021 |
Detecting vehicle anomaly by sensor consistency: An edge computing based mechanism Z Wang, F Guo, Y Meng, H Li, H Zhu, Z Cao 2018 IEEE Global Communications Conference (GLOBECOM), 1-7, 2018 | 8 | 2018 |
Edge-assisted stream scheduling scheme for the green-communication-based IoT L Wang, Y Meng, H Zhu, M Tang, K Ota IEEE Internet of Things Journal 6 (4), 7282-7292, 2019 | 7 | 2019 |
Thwarting longitudinal location exposure attacks in advertising ecosystem via edge computing L Yu, S Zhang, L Zhou, Y Meng, S Du, H Zhu 2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022 | 6 | 2022 |
Secure and efficient uav tracking in space-air-ground integrated network J Li, W Zhang, Y Meng, S Li, L Ma, Z Liu, H Zhu IEEE Transactions on Vehicular Technology 72 (8), 10682-10695, 2023 | 4 | 2023 |
Unleashing cheapfakes through trojan plugins of large language models T Dong, G Chen, S Li, M Xue, R Holland, Y Meng, Z Liu, H Zhu arXiv preprint arXiv:2312.00374, 2023 | 3 | 2023 |
De-anonymization Attacks on Metaverse Y Meng, Y Zhan, J Li, S Du, H Zhu, XS Shen IEEE INFOCOM 2023, 2023 | 3 | 2023 |
Literature Review of Security in Smart Home Network Y Meng, H Zhu, X Shen Security in Smart Home Networks, 21-35, 2023 | 3 | 2023 |