Wireless sensing for human activity: A survey J Liu, H Liu, Y Chen, Y Wang, C Wang IEEE Communications Surveys & Tutorials 22 (3), 1629-1645, 2019 | 280 | 2019 |
Friend or foe? Your wearable devices reveal your personal pin C Wang, X Guo, Y Wang, Y Chen, B Liu Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 163 | 2016 |
Fine-grained sleep monitoring: Hearing your breathing with smartphones Y Ren, C Wang, J Yang, Y Chen 2015 IEEE Conference on Computer Communications (INFOCOM), 1194-1202, 2015 | 129 | 2015 |
User authentication on mobile devices: Approaches, threats and trends C Wang, Y Wang, Y Chen, H Liu, J Liu Computer Networks 170, 107118, 2020 | 114 | 2020 |
VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration J Liu, C Wang, Y Chen, N Saxena Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 98 | 2017 |
Towards in-baggage suspicious object detection using commodity wifi C Wang, J Liu, Y Chen, H Liu, Y Wang 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 69 | 2018 |
Locating rogue access point using fine-grained channel information C Wang, X Zheng, Y Chen, J Yang IEEE Transactions on Mobile Computing 16 (9), 2560-2573, 2016 | 45 | 2016 |
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations C Wang, SA Anand, J Liu, P Walker, Y Chen, N Saxena Proceedings of the 35th Annual Computer Security Applications Conference, 42-56, 2019 | 42 | 2019 |
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers SA Anand, C Wang, J Liu, N Saxena, Y Chen Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 33 | 2021 |
Accurate rogue access point localization leveraging fine-grained channel information X Zheng, C Wang, Y Chen, J Yang 2014 IEEE conference on communications and network security, 211-219, 2014 | 33 | 2014 |
Signature verification using critical segments for securing mobile transactions Y Ren, C Wang, Y Chen, MC Chuah, J Yang IEEE Transactions on Mobile Computing 19 (3), 724-739, 2019 | 31 | 2019 |
Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers SA Anand, C Wang, J Liu, N Saxena, Y Chen arXiv preprint arXiv:1907.05972, 2019 | 28 | 2019 |
Personal PIN leakage from wearable devices C Wang, X Guo, Y Chen, Y Wang, B Liu IEEE Transactions on Mobile Computing 17 (3), 646-660, 2017 | 28 | 2017 |
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training C Shi, Y Wang, Y Chen, N Saxena, C Wang* Annual Computer Security Applications Conference, 829-842, 2020 | 25* | 2020 |
Noninvasive fine-grained sleep monitoring leveraging smartphones Y Ren, C Wang, Y Chen, J Yang, H Li IEEE Internet of Things Journal 6 (5), 8248-8261, 2019 | 25 | 2019 |
Critical segment based real-time e-signature for securing mobile transactions Y Ren, C Wang, Y Chen, MC Chuah, J Yang 2015 IEEE Conference on Communications and Network Security (CNS), 7-15, 2015 | 24 | 2015 |
Systems and methods for user input and authentication using vibration analysis C YingYing, J Liu, C Wang, N Saxena US Patent 11,461,442, 2022 | 23 | 2022 |
Wristspy: Snooping passcodes in mobile payment using wrist-worn wearables C Wang, J Liu, X Guo, Y Wang, Y Chen IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2071-2079, 2019 | 22 | 2019 |
WiEat: Fine-grained device-free eating monitoring leveraging Wi-Fi signals Z Lin, Y Xie, X Guo, Y Ren, Y Chen, C Wang 2020 29th International Conference on Computer Communications and Networks …, 2020 | 19 | 2020 |
Echovib: Exploring voice authentication via unique non-linear vibrations of short replayed speech SA Anand, J Liu, C Wang, M Shirvanian, N Saxena, Y Chen Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 17 | 2021 |