Urmăriți
Chen Wang
Titlu
Citat de
Citat de
Anul
Wireless sensing for human activity: A survey
J Liu, H Liu, Y Chen, Y Wang, C Wang
IEEE Communications Surveys & Tutorials 22 (3), 1629-1645, 2019
2862019
Friend or foe? Your wearable devices reveal your personal pin
C Wang, X Guo, Y Wang, Y Chen, B Liu
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
1652016
Fine-grained sleep monitoring: Hearing your breathing with smartphones
Y Ren, C Wang, J Yang, Y Chen
2015 IEEE Conference on Computer Communications (INFOCOM), 1194-1202, 2015
1312015
User authentication on mobile devices: Approaches, threats and trends
C Wang, Y Wang, Y Chen, H Liu, J Liu
Computer Networks 170, 107118, 2020
1152020
VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration
J Liu, C Wang, Y Chen, N Saxena
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1002017
Towards in-baggage suspicious object detection using commodity wifi
C Wang, J Liu, Y Chen, H Liu, Y Wang
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
722018
Locating rogue access point using fine-grained channel information
C Wang, X Zheng, Y Chen, J Yang
IEEE Transactions on Mobile Computing 16 (9), 2560-2573, 2016
452016
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations
C Wang, SA Anand, J Liu, P Walker, Y Chen, N Saxena
Proceedings of the 35th Annual Computer Security Applications Conference, 42-56, 2019
412019
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers
SA Anand, C Wang, J Liu, N Saxena, Y Chen
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
362021
Accurate rogue access point localization leveraging fine-grained channel information
X Zheng, C Wang, Y Chen, J Yang
2014 IEEE conference on communications and network security, 211-219, 2014
332014
Signature verification using critical segments for securing mobile transactions
Y Ren, C Wang, Y Chen, MC Chuah, J Yang
IEEE Transactions on Mobile Computing 19 (3), 724-739, 2019
312019
Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers
SA Anand, C Wang, J Liu, N Saxena, Y Chen
arXiv preprint arXiv:1907.05972, 2019
282019
Personal PIN leakage from wearable devices
C Wang, X Guo, Y Chen, Y Wang, B Liu
IEEE Transactions on Mobile Computing 17 (3), 646-660, 2017
282017
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training
C Shi, Y Wang, Y Chen, N Saxena, C Wang*
Annual Computer Security Applications Conference, 829-842, 2020
25*2020
Noninvasive fine-grained sleep monitoring leveraging smartphones
Y Ren, C Wang, Y Chen, J Yang, H Li
IEEE Internet of Things Journal 6 (5), 8248-8261, 2019
252019
Critical segment based real-time e-signature for securing mobile transactions
Y Ren, C Wang, Y Chen, MC Chuah, J Yang
2015 IEEE Conference on Communications and Network Security (CNS), 7-15, 2015
242015
Wristspy: Snooping passcodes in mobile payment using wrist-worn wearables
C Wang, J Liu, X Guo, Y Wang, Y Chen
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2071-2079, 2019
222019
WiEat: Fine-grained device-free eating monitoring leveraging Wi-Fi signals
Z Lin, Y Xie, X Guo, Y Ren, Y Chen, C Wang
2020 29th International Conference on Computer Communications and Networks …, 2020
192020
Echovib: Exploring voice authentication via unique non-linear vibrations of short replayed speech
SA Anand, J Liu, C Wang, M Shirvanian, N Saxena, Y Chen
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
172021
Poster: Hearing your breathing: fine-grained sleep monitoring using smartphones
Y Ren, C Wang, Y Chen, J Yang
Proceedings of the 20th annual international conference on Mobile computing …, 2014
172014
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20