Yan Meng
Yan Meng
Phd Candidate of Computer Science & Engineering Department, Shanghai Jiao Tong University
Verified email at sjtu.edu.cn
TitleCited byYear
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
862016
Homonit: Monitoring smart home apps from encrypted traffic
W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
272018
Securing consumer IoT in the smart home: Architecture, challenges, and countermeasures
Y Meng, W Zhang, H Zhu, XS Shen
IEEE Wireless Communications 25 (6), 53-59, 2018
182018
Wivo: Enhancing the security of voice control system via wireless signal in iot environment
Y Meng, Z Wang, W Zhang, P Wu, H Zhu, X Liang, Y Liu
Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc …, 2018
152018
Attacks and defenses in location-based social networks: a heuristic number theory approach
J Peng, Y Meng, M Xue, X Hei, KW Ross
2015 International Symposium on Security and Privacy in Social Networks and …, 2015
112015
Detecting vehicle anomaly by sensor consistency: An edge computing based mechanism
Z Wang, F Guo, Y Meng, H Li, H Zhu, Z Cao
2018 IEEE Global Communications Conference (GLOBECOM), 1-7, 2018
12018
Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT
L Wang, Y Meng, H Zhu, M Tang, K Ota
IEEE Internet of Things Journal 6 (4), 7282-7292, 2019
2019
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures
Y Meng, J Li, H Zhu, X Liang, Y Liu, N Ruan
IEEE Transactions on Mobile Computing, 2019
2019
Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home
L Zhang, Y Meng, J Yu, C Xiang, B Falk, H Zhu
The system can't perform the operation now. Try again later.
Articles 1–9