Yan Meng
Yan Meng
Phd Candidate of Computer Science & Engineering Department, Shanghai Jiao Tong University
Verified email at sjtu.edu.cn
Cited by
Cited by
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Homonit: Monitoring smart home apps from encrypted traffic
W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Securing consumer IoT in the smart home: Architecture, challenges, and countermeasures
Y Meng, W Zhang, H Zhu, XS Shen
IEEE Wireless Communications 25 (6), 53-59, 2018
Wivo: Enhancing the security of voice control system via wireless signal in iot environment
Y Meng, Z Wang, W Zhang, P Wu, H Zhu, X Liang, Y Liu
Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc …, 2018
Attacks and defenses in location-based social networks: a heuristic number theory approach
J Peng, Y Meng, M Xue, X Hei, KW Ross
2015 International Symposium on Security and Privacy in Social Networks and …, 2015
Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT
L Wang, Y Meng, H Zhu, M Tang, K Ota
IEEE Internet of Things Journal 6 (4), 7282-7292, 2019
Detecting vehicle anomaly by sensor consistency: An edge computing based mechanism
Z Wang, F Guo, Y Meng, H Li, H Zhu, Z Cao
2018 IEEE Global Communications Conference (GLOBECOM), 1-7, 2018
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment
Y Meng, H Zhu, J Li, J Li, Y Liu
IEEE Transactions on Dependable and Secure Computing, 2020
An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts
AP Wu, J Li, Y Meng, H Zhu
2019 IEEE International Conference on Big Data (Big Data), 5937-5944, 2019
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures
Y Meng, J Li, H Zhu, X Liang, Y Liu, N Ruan
IEEE Transactions on Mobile Computing 19 (2), 432-449, 2019
Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home
L Zhang, Y Meng, J Yu, C Xiang, B Falk, H Zhu
The system can't perform the operation now. Try again later.
Articles 1–11