Login / Signup
Chen Yan
ORCID
Publication Activity (10 Years)
Years Active: 2023-2024
Publications (10 Years): 16
Top Topics
Speaker Recognition
Video Conferencing
Object Features
Physically Plausible
Top Venues
SP
CoRR
USENIX Security Symposium
IEEE Internet Things J.
</>
Publications
</>
Xinfeng Li
,
Yuchen Yang
,
Jiangyi Deng
,
Chen Yan
,
Yanjiao Chen
,
Xiaoyu Ji
,
Wenyuan Xu
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models.
CoRR
(2024)
Xinfeng Li
,
Zhicong Zheng
,
Chen Yan
,
Chaohao Li
,
Xiaoyu Ji
,
Wenyuan Xu
Toward Pitch-Insensitive Speaker Verification via Soundfield.
IEEE Internet Things J.
11 (1) (2024)
Yan Jiang
,
Xiaoyu Ji
,
Kai Wang
,
Chen Yan
,
Richard Mitev
,
Ahmad-Reza Sadeghi
,
Wenyuan Xu
Marionette: Manipulate Your Touchscreen via a Charging Cable.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Zizhi Jin
,
Xuancun Lu
,
Bo Yang
,
Yushi Cheng
,
Chen Yan
,
Xiaoyu Ji
,
Wenyuan Xu
Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack.
WWW
(2024)
Xinfeng Li
,
Junning Ze
,
Chen Yan
,
Yushi Cheng
,
Xiaoyu Ji
,
Wenyuan Xu
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound.
IEEE Internet Things J.
11 (8) (2024)
Kai Wang
,
Shilin Xiao
,
Xiaoyu Ji
,
Chen Yan
,
Chaohao Li
,
Wenyuan Xu
Volttack: Control IoT Devices by Manipulating Power Supply Voltage.
SP
(2023)
Zhixin Xie
,
Chen Yan
,
Xiaoyu Ji
,
Wenyuan Xu
BitDance: Manipulating UART Serial Communication with IEMI.
RAID
(2023)
Yan Long
,
Chen Yan
,
Shilin Xiao
,
Shivan Prasad
,
Wenyuan Xu
,
Kevin Fu
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
SP
(2023)
Zizhi Jin
,
Xiaoyu Ji
,
Yushi Cheng
,
Bo Yang
,
Chen Yan
,
Wenyuan Xu
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.
SP
(2023)
Shilin Xiao
,
Xiaoyu Ji
,
Chen Yan
,
Zhicong Zheng
,
Wenyuan Xu
MicPro: Microphone-based Voice Privacy Protection.
CCS
(2023)
Xinfeng Li
,
Chen Yan
,
Xuancun Lu
,
Zihan Zeng
,
Xiaoyu Ji
,
Wenyuan Xu
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time.
CoRR
(2023)
Qinhong Jiang
,
Xiaoyu Ji
,
Chen Yan
,
Zhixin Xie
,
Haina Lou
,
Wenyuan Xu
GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI.
USENIX Security Symposium
(2023)
Xinfeng Li
,
Xiaoyu Ji
,
Chen Yan
,
Chaohao Li
,
Yichen Li
,
Zhenning Zhang
,
Wenyuan Xu
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
USENIX Security Symposium
(2023)
Ruochen Zhou
,
Xiaoyu Ji
,
Chen Yan
,
Yi-Chao Chen
,
Wenyuan Xu
,
Chaohao Li
DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.
SP
(2023)
Xinfeng Li
,
Junning Ze
,
Chen Yan
,
Yushi Cheng
,
Xiaoyu Ji
,
Wenyuan Xu
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound.
CoRR
(2023)
Zhicong Zheng
,
Xinfeng Li
,
Chen Yan
,
Xiaoyu Ji
,
Wenyuan Xu
The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems.
ACM Multimedia
(2023)