default search action
Yanjiao Chen
Person information
- affiliation: Zhejiang University, College of Electrical Engineering, China
- affiliation (former): Wuhan University, Department of Computer Science, China
- affiliation (former): University of Toronto, Department of Electrical and Computer Engineering, ON, Canada
- affiliation (former, PhD 2015): Hong Kong University of Science and Technology, Department of Computer Science and Engineering, Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j106]Xiuwen Liu, Shuo Wang, Yanjiao Chen:
Adaptive scheduling for Internet of Vehicles using deconfounded graph transfer learning. Comput. Networks 256: 110899 (2025) - [j105]Yang Yang, Jiaxing Zhang, Yanjiao Chen, Qing Huang, Fei Chen, Jing Chen:
An efficient encrypted search with owner-level and attribute-level access controls. Comput. Networks 258: 111039 (2025) - [j104]Xueluan Gong, Shuaike Li, Yanjiao Chen, Mingzhe Li, Rubin Wei, Qian Wang, Kwok-Yan Lam:
Augmenting Model Extraction Attacks Against Disruption-Based Defenses. IEEE Trans. Inf. Forensics Secur. 20: 531-546 (2025) - 2024
- [j103]Zhicong Zheng, Zhenchang Xia, Yu-Cheng Chou, Yanjiao Chen:
TRCC: Transferable Congestion Control With Reinforcement Learning. IEEE Internet Things J. 11(2): 2273-2285 (2024) - [j102]Yuan Wu, Shoudu Bai, Meiqin Fu, Xinrong Hu, Weibing Zhong, Lei Ding, Yanjiao Chen:
TeethFa: Real-Time, Hand-Free Teeth Gestures Interaction Using Fabric Sensors. IEEE Internet Things J. 11(21): 35223-35237 (2024) - [j101]Qianhao Miao, Tianyu Ren, Jiahan Dong, Yanjiao Chen, Wenyuan Xu:
A 3C Authentication: A Cross-Domain, Certificateless, and Consortium-Blockchain-Based Authentication Method for Vehicle-to-Grid Networks in a Smart Grid. Symmetry 16(3): 336 (2024) - [j100]Yinan Zhong, Mingyu Pan, Yanjiao Chen, Wenyuan Xu:
Res-DFNN: An NN-Based Device Fingerprint Extraction Method Using Network Packet Data. Symmetry 16(4): 443 (2024) - [j99]Xueluan Gong, Yanjiao Chen, Huayang Huang, Weihan Kong, Ziyao Wang, Chao Shen, Qian Wang:
KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework. IEEE Trans. Dependable Secur. Comput. 21(4): 1605-1620 (2024) - [j98]Xueluan Gong, Zheng Fang, Bowen Li, Tao Wang, Yanjiao Chen, Qian Wang:
Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models. IEEE Trans. Dependable Secur. Comput. 21(4): 2672-2685 (2024) - [j97]Xiuwen Liu, Yanjiao Chen, Shanchen Pang:
Defending Against Membership Inference Attack for Counterfactual Federated Recommendation With Differentially Private Representation Learning. IEEE Trans. Inf. Forensics Secur. 19: 8037-8051 (2024) - [j96]Yuan Wu, Jian Zhang, Yanjiao Chen, Wuxuan Shi, Huiri Tan:
MC-Tracking: Towards Ubiquitous Menstrual Cycle Tracking Using the Smartphone. IEEE Trans. Mob. Comput. 23(5): 5604-5615 (2024) - [j95]Xiuwen Liu, Yanjiao Chen, Shanchen Pang:
Trading off Coverage and Emergency for Hybrid Task Scheduling in Traffic Anomaly Detection. IEEE Trans. Mob. Comput. 23(12): 13189-13206 (2024) - [j94]Hongliang Bi, Wenbo Zhang, Shuaihao Li, Yanjiao Chen, Chaoyang Zhou, Tang Zhou:
SmartSit: Sitting Posture Recognition Through Acoustic Sensing on Smartphones. IEEE Trans. Multim. 26: 8119-8130 (2024) - [j93]Yushi Cheng, Boyang Zhou, Yanjiao Chen, Yi-Chao Chen, Xiaoyu Ji, Wenyuan Xu:
Evaluating Compressive Sensing on the Security of Computer Vision Systems. ACM Trans. Sens. Networks 20(3): 56:1-56:24 (2024) - [j92]Yuan Wu, Yanjiao Chen, Jian Zhang, Xueluan Gong, Hongliang Bi:
Ubi-AD: Towards Ubiquitous, Passive Alzheimer Detection using the Smartwatch. ACM Trans. Sens. Networks 20(5): 107:1-107:22 (2024) - [j91]Shuqin Cao, Libing Wu, Rui Zhang, Yanjiao Chen, Jianxin Li, Qin Liu:
A Spatial-Temporal Gated Hypergraph Convolution Network for Traffic Prediction. IEEE Trans. Veh. Technol. 73(7): 9546-9559 (2024) - [c58]Jialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Jiayang Xu, Xinfeng Li, Wenyuan Xu:
Legilimens: Practical and Unified Content Moderation for Large Language Model Services. CCS 2024: 1151-1165 - [c57]Yijie Bai, Zhongming Ma, Yanjiao Chen, Jiangyi Deng, Shengyuan Pang, Yan Liu, Wenyuan Xu:
Alchemy: Data-Free Adversarial Training. CCS 2024: 3808-3822 - [c56]Xueluan Gong, Rubin Wei, Ziyao Wang, Yuchen Sun, Jiawen Peng, Yanjiao Chen, Qian Wang:
Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions. CCS 2024: 3838-3852 - [c55]Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu:
SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models. CCS 2024: 4807-4821 - [c54]Jiahan Dong, Tong Jin, Bowen Li, Yinan Zhong, Guangxin Guo, Xiaohu Wang, Yanjiao Chen:
DIFORMER: An Attention-Based IoT Device Identification Method. CyberC 2024: 30-39 - [c53]Jialin Wu, Kaikai Pan, Yanjiao Chen, Jiangyi Deng, Shengyuan Pang, Wenyuan Xu:
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities. MetaCom 2024: 105-112 - [c52]Shengyuan Pang, Yanjiao Chen, Jiangyi Deng, Jialin Wu, Yijie Bai, Wenyuan Xu:
Adversarial for Good - Defending Training Data Privacy with Adversarial Attack Wisdom. MetaCom 2024: 190-197 - [c51]Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu:
Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models. SP 2024: 2553-2571 - [i12]Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu:
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models. CoRR abs/2404.06666 (2024) - [i11]Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu:
SOPHON: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models. CoRR abs/2404.12699 (2024) - [i10]Jialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Jiayang Xu, Xinfeng Li, Wenyuan Xu:
Legilimens: Practical and Unified Content Moderation for Large Language Model Services. CoRR abs/2408.15488 (2024) - [i9]Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu:
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer. CoRR abs/2409.02074 (2024) - [i8]Xueluan Gong, Mingzhe Li, Yilin Zhang, Fengyuan Ran, Chen Chen, Yanjiao Chen, Qian Wang, Kwok-Yan Lam:
Effective and Evasive Fuzz Testing-Driven Jailbreaking Attacks against LLMs. CoRR abs/2409.14866 (2024) - [i7]Xueluan Gong, Bowei Tian, Meng Xue, Shuike Li, Yanjiao Chen, Qian Wang:
Megatron: Evasive Clean-Label Backdoor Attacks against Vision Transformer. CoRR abs/2412.04776 (2024) - [i6]Xueluan Gong, Bowei Tian, Meng Xue, Yuan Wu, Yanjiao Chen, Qian Wang:
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers. CoRR abs/2412.06149 (2024) - 2023
- [j90]Xiuwen Liu, Yanjiao Chen:
Group effect-based privacy-preserving data aggregation for mobile crowdsensing. Comput. Networks 222: 109507 (2023) - [j89]Wanyu Qiu, Chuanhe Huang, Yanjiao Chen, Shidong Huang, Haizhou Bao, Zhengfa Li:
A contract-based energy harvesting mechanism in UAV communication network. Comput. Commun. 199: 50-61 (2023) - [j88]Meng Xue, Kuang Peng, Xueluan Gong, Qian Zhang, Yanjiao Chen, Routing Li:
Echo: Reverberation-based Fast Black-Box Adversarial Attacks on Intelligent Audio Systems. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(3): 137:1-137:24 (2023) - [j87]Runmin Ou, Yanjiao Chen, Yangtao Deng:
WiWalk: Gait-Based Dual-User Identification Using WiFi Device. IEEE Internet Things J. 10(6, March 15): 5321-5334 (2023) - [j86]Yuan Wu, Jian Zhang, Yanjiao Chen, Junkongshuai Wang, Wuxuan Shi, Qian Zhang:
Ubi-Asthma: Toward Ubiquitous Asthma Detection Using the Smartwatch. IEEE Internet Things J. 10(13): 11576-11587 (2023) - [j85]Meng Xue, Yanjiao Chen, Xueluan Gong, Houze Cao, Jian Zhang, Qian Zhang:
Meta-Learning for Human-Centered Wireless Sensing: Architecture, Applications, and Challenges. IEEE Netw. 37(1): 88-94 (2023) - [j84]Yanjiao Chen, Zhicong Zheng, Xueluan Gong:
MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 4188-4198 (2023) - [j83]Xueluan Gong, Ziyao Wang, Yanjiao Chen, Meng Xue, Qian Wang, Chao Shen:
Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters. IEEE Trans. Dependable Secur. Comput. 20(6): 4993-5004 (2023) - [j82]Xiaoyan Yin, Wanyu Lin, Kexin Sun, Chun Wei, Yanjiao Chen:
A2S2-GNN: Rigging GNN-Based Social Status by Adversarial Attacks in Signed Social Networks. IEEE Trans. Inf. Forensics Secur. 18: 206-220 (2023) - [j81]Yanlong Qiu, Jiaxi Zhang, Yanjiao Chen, Jin Zhang, Bo Ji:
Radar2: Passive Spy Radar Detection and Localization Using COTS mmWave Radar. IEEE Trans. Inf. Forensics Secur. 18: 2810-2825 (2023) - [j80]Xueluan Gong, Ziyao Wang, Shuaike Li, Yanjiao Chen, Qian Wang:
A GAN-Based Defense Framework Against Model Inversion Attacks. IEEE Trans. Inf. Forensics Secur. 18: 4475-4487 (2023) - [j79]Yanjiao Chen, Xiaotian Zhu, Xueluan Gong, Xinjing Yi, Shuyang Li:
Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions. IEEE Trans. Ind. Informatics 19(1): 20-28 (2023) - [j78]Xueluan Gong, Yanjiao Chen, Wenbin Yang, Huayang Huang, Qian Wang:
B3: Backdoor Attacks against Black-box Machine Learning Models. ACM Trans. Priv. Secur. 26(4): 43:1-43:24 (2023) - [j77]Xiaoyan Yin, Xiaoqian Mi, Sijia Yu, Yanjiao Chen, Baochun Li:
Harmony or Involution: Game Inspiring Age-of-Information Optimization for Edge Data Gathering in Internet of Things. ACM Trans. Sens. Networks 19(2): 46:1-46:23 (2023) - [j76]Yanjiao Chen, Yushi Cheng, Xiaoyu Ji, Boyang Zhou, Wenyuan Xu, Fei Teng:
PDGes: An Interpretable Detection Model for Parkinson's Disease Using Smartphones. ACM Trans. Sens. Networks 19(4): 77:1-77:21 (2023) - [j75]Jian Zhang, Yuan Wu, Yanjiao Chen, Mingxi Li, Junkongshuai Wang, Qian Zhang:
WIB: Real-time, Non-intrusive Blood Pressure Detection Using Smartphones. ACM Trans. Sens. Networks 19(4): 87:1-87:27 (2023) - [j74]Xueluan Gong, Yanjiao Chen, Qian Wang, Weihan Kong:
Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions. IEEE Wirel. Commun. 30(2): 114-121 (2023) - [c50]Lingshuo Meng, Yijie Bai, Yanjiao Chen, Yutong Hu, Wenyuan Xu, Haiqin Weng:
Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration. CCS 2023: 1153-1167 - [c49]Chen Zhang, Boyang Zhou, Zhiqiang He, Zeyuan Liu, Yanjiao Chen, Wenyuan Xu, Baochun Li:
Oblivion: Poisoning Federated Learning by Inducing Catastrophic Forgetting. INFOCOM 2023: 1-10 - [c48]Yanjiao Chen, Rui Guan, Xueluan Gong, Jianshuo Dong, Meng Xue:
D-DAE: Defense-Penetrating Model Extraction Attacks. SP 2023: 382-399 - [c47]Xueluan Gong, Yanjiao Chen, Wang Yang, Qian Wang, Yuzhe Gu, Huayang Huang, Chao Shen:
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation. SP 2023: 755-772 - [c46]Yijie Bai, Yanjiao Chen, Hanlei Zhang, Wenyuan Xu, Haiqin Weng, Dou Goodman:
VILLAIN: Backdoor Attacks Against Vertical Split Learning. USENIX Security Symposium 2023: 2743-2760 - [c45]Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu:
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion. USENIX Security Symposium 2023: 5163-5180 - [c44]Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu:
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization. USENIX Security Symposium 2023: 5181-5198 - [c43]Hanlei Zhang, Meng Xue, Yanjiao Chen:
DDS: An Auction Based on a Variant of Data Shapley for Federated Learning. WCNC 2023: 1-6 - [c42]Xueluan Gong, Ziyao Wang, Yanjiao Chen, Qian Wang, Cong Wang, Chao Shen:
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples. WWW 2023: 2045-2053 - [i5]Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu:
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion. CoRR abs/2302.12434 (2023) - 2022
- [j73]Xueluan Gong, Yanjiao Chen, Qian Wang, Meng Wang, Shuyang Li:
Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions. IEEE Commun. Mag. 60(9): 46-52 (2022) - [j72]Libing Wu, Shuqin Cao, Yanjiao Chen, Jianxin Li, Jianqun Cui, Yanan Chang:
A cooperative mobility model for multiple autonomous vehicles. Comput. Commun. 195: 148-161 (2022) - [j71]Meng Xue, Yanjiao Chen, Xueluan Gong, Jian Zhang, Chunkai Fan:
Wet-Ra: Monitoring Diapers Wetness with Wireless Signals. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 84:1-84:26 (2022) - [j70]Chenyu Huang, Yongjun Zhao, Huangxun Chen, Xu Wang, Qian Zhang, Yanjiao Chen, Huaxiong Wang, Kwok-Yan Lam:
ZkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System. IEEE Internet Things J. 9(6): 4330-4342 (2022) - [j69]Yang Yang, Yanjiao Chen, Fei Chen, Jing Chen:
Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information. IEEE Internet Things J. 9(13): 10434-10445 (2022) - [j68]Jian Zhang, Yuan Wu, Yanjiao Chen, Junkongshuai Wang, Jinxing Huang, Qian Zhang:
Ubi-Fatigue: Toward Ubiquitous Fatigue Detection via Contactless Sensing. IEEE Internet Things J. 9(15): 14103-14115 (2022) - [j67]Haiyan Hu, Qian Zhang, Yanjiao Chen:
NIRSCam: A Mobile Near-Infrared Sensing System for Food Calorie Estimation. IEEE Internet Things J. 9(19): 18934-18945 (2022) - [j66]Hongliang Bi, Yanjiao Chen, Xiaotian Zhu:
A Multipath Routing for Payment Channel Networks for Internet of Things Microtransactions. IEEE Internet Things J. 9(20): 19670-19681 (2022) - [j65]Xueluan Gong, Yanjiao Chen, Huayang Huang, Yuqing Liao, Shuai Wang, Qian Wang:
Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers. IEEE Netw. 36(1): 84-90 (2022) - [j64]Yanjiao Chen, Xin Tian, Qian Wang, Jianlin Jiang, Minghui Li, Qian Zhang:
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation. IEEE Trans. Dependable Secur. Comput. 19(3): 2038-2053 (2022) - [j63]Yang Yang, Yanjiao Chen, Fei Chen, Jing Chen:
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage. IEEE Trans. Inf. Forensics Secur. 17: 1359-1371 (2022) - [j62]Yanjiao Chen, Runmin Ou, Zhiyang Li, Kaishun Wu:
WiFace: Facial Expression Recognition Using Wi-Fi Signals. IEEE Trans. Mob. Comput. 21(1): 378-391 (2022) - [j61]Jian Zhang, Yuan Wu, Yanjiao Chen, Tong Chen:
Health-Radio: Towards Contactless Myocardial Infarction Detection Using Radio Signals. IEEE Trans. Mob. Comput. 21(2): 585-597 (2022) - [j60]Yanjiao Chen, Yuyang Ran, Jingyue Zhou, Jian Zhang, Xueluan Gong:
MPCN-RP: A Routing Protocol for Blockchain-Based Multi-Charge Payment Channel Networks. IEEE Trans. Netw. Serv. Manag. 19(2): 1229-1242 (2022) - [j59]Yanjiao Chen, Xuxian Li, Jian Zhang, Hongliang Bi:
Multi-Party Payment Channel Network Based on Smart Contract. IEEE Trans. Netw. Serv. Manag. 19(4): 4847-4857 (2022) - [j58]Yanjiao Chen, Meng Xue, Jian Zhang, Runmin Ou, Qian Zhang, Peng Kuang:
DetectDUI: An In-Car Detection System for Drink Driving and BACs. IEEE/ACM Trans. Netw. 30(2): 896-910 (2022) - [j57]Jiai He, Tong Wang, Chanfei Wang, Yanjiao Chen:
Improved Measurement Matrix Construction with Pseudo-Random Sequence in Compressed Sensing. Wirel. Pers. Commun. 123(4): 3003-3024 (2022) - [c41]Jiangyi Deng, Yanjiao Chen, Wenyuan Xu:
FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems. CCS 2022: 755-767 - [c40]Xueluan Gong, Yanjiao Chen, Jianshuo Dong, Qian Wang:
ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks. NDSS 2022 - [i4]Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu:
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization. CoRR abs/2210.15140 (2022) - 2021
- [j56]Xiuwen Liu, Jianming Fu, Yanjiao Chen, Weichen Luo, Zihan Tang:
Trust-Aware sensing Quality estimation for team Crowdsourcing in social IoT. Comput. Networks 184: 107695 (2021) - [j55]Xu Wang, Yanjiao Chen, Qian Zhang:
Incentivizing cooperative relay in UTXO-based blockchain network. Comput. Networks 185: 107631 (2021) - [j54]Libing Wu, Shuqin Cao, Yanjiao Chen, Jianqun Cui, Yanan Chang:
An adaptive multiple spray-and-wait routing algorithm based on social circles in delay tolerant networks. Comput. Networks 189: 107901 (2021) - [j53]Yanjiao Chen, Baolin Zheng, Zihan Zhang, Qian Wang, Chao Shen, Qian Zhang:
Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions. ACM Comput. Surv. 53(4): 84:1-84:37 (2021) - [j52]Yanjiao Chen, Meng Xue, Jian Zhang, Qianyun Guan, Zhiyuan Wang, Qian Zhang, Wei Wang:
ChestLive: Fortifying Voice-based Authentication with Chest Motion Biometric on Smart Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(4): 148:1-148:25 (2021) - [j51]Xiaoyan Yin, Yanjiao Chen, Cheng Xu, Sijia Yu, Baochun Li:
Matchmaker: Stable Task Assignment With Bounded Constraints for Crowdsourcing Platforms. IEEE Internet Things J. 8(3): 1599-1610 (2021) - [j50]Yanjiao Chen, Wanyu Qiu, Runmin Ou, Chuanhe Huang:
A Contract-Based Insurance Incentive Mechanism Boosted by Wearable Technology. IEEE Internet Things J. 8(7): 6089-6100 (2021) - [j49]Xueluan Gong, Yanjiao Chen, Qian Wang, Huayang Huang, Lingshuo Meng, Chao Shen, Qian Zhang:
Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment. IEEE J. Sel. Areas Commun. 39(8): 2617-2631 (2021) - [j48]Hongliang Bi, Jian Zhang, Yanjiao Chen, Chaoyang Zhou, Zhibo Wang:
Magic-hand: Turn a smartwatch into a mouse. Pervasive Mob. Comput. 78: 101487 (2021) - [j47]Zhenchang Xia, Shan Xue, Jia Wu, Yanjiao Chen, Junjie Chen, Libing Wu:
Deep Reinforcement Learning for Smart City Communication Networks. IEEE Trans. Ind. Informatics 17(6): 4188-4196 (2021) - [j46]Zhenchang Xia, Jia Wu, Libing Wu, Yanjiao Chen, Jian Yang, Philip S. Yu:
A Comprehensive Survey of the Key Technologies and Challenges Surrounding Vehicular Ad Hoc Networks. ACM Trans. Intell. Syst. Technol. 12(4): 37:1-37:30 (2021) - [j45]Xiaoyan Yin, Xiao Hu, Yanjiao Chen, Xu Yuan, Baochun Li:
Signed-PageRank: An Efficient Influence Maximization Framework for Signed Social Networks. IEEE Trans. Knowl. Data Eng. 33(5): 2208-2222 (2021) - [j44]Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Peipei Jiang, Yanjiao Chen, Zhibo Wang:
Stealing Your Android Patterns via Acoustic Signals. IEEE Trans. Mob. Comput. 20(4): 1656-1671 (2021) - [j43]Jian Zhang, Hongliang Bi, Yanjiao Chen, Qian Zhang, Zhaoyuan Fu, Yunzhe Li, Zeyu Li:
SmartSO: Chinese Character and Stroke Order Recognition With Smartwatch. IEEE Trans. Mob. Comput. 20(7): 2490-2504 (2021) - [j42]Yang Yang, Yanjiao Chen, Fei Chen:
A Compressive Integrity Auditing Protocol for Secure Cloud Storage. IEEE/ACM Trans. Netw. 29(3): 1197-1209 (2021) - [j41]Yanjiao Chen, Long Lin, Baochun Li, Qian Wang, Qian Zhang:
Silhouette: Efficient Cloud Configuration Exploration for Large-Scale Analytics. IEEE Trans. Parallel Distributed Syst. 32(8): 2049-2061 (2021) - [c39]Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu:
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. CCS 2021: 1861-1883 - [c38]Xiuwen Liu, Yanjiao Chen:
Trust-aware Crowdsourcing for Radio Environment Mapping with Privacy Preservation. DySPAN 2021: 139-146 - [c37]Yanjiao Chen, Runmin Ou, Yangtao Deng, Xiaoyan Yin:
WIAGE: A Gait-based Age Estimation System Using Wireless Signals. GLOBECOM 2021: 1-6 - [c36]Xueluan Gong, Yanjiao Chen, Wenbin Yang, Guanghao Mei, Qian Wang:
InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion. IJCAI 2021: 2439-2447 - [c35]Zhenchang Xia, Yanjiao Chen, Libing Wu, Yu-Cheng Chou, Zhicong Zheng, Haoyang Li, Baochun Li:
A Multi-objective Reinforcement Learning Perspective on Internet Congestion Control. IWQoS 2021: 1-10 - [i3]Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu:
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. CoRR abs/2109.09958 (2021) - 2020
- [j40]Hongliang Bi, Jian Zhang, Yanjiao Chen:
SmartGe: Identifying Pen-Holding Gesture With Smartwatch. IEEE Access 8: 28820-28830 (2020) - [j39]Xueluan Gong, Qian Wang, Yanjiao Chen, Wang Yang, Xinchang Jiang:
Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models. IEEE Commun. Mag. 58(12): 83-89 (2020) - [j38]Zhenchang Xia, Shan Xue, Libing Wu, Jiaxin Sun, Yanjiao Chen, Rui Zhang:
ForeXGBoost: passenger car sales prediction based on XGBoost. Distributed Parallel Databases 38(3): 713-738 (2020) - [j37]Xiuwen Liu, Yanjiao Chen, Jianming Fu:
MFRep: Joint user and employer alignment across heterogeneous social networks. Neurocomputing 414: 36-56 (2020) - [j36]Jian Zhang, Hongliang Bi, Yanjiao Chen, Mingyu Wang, Liming Han, Ligan Cai:
SmartHandwriting: Handwritten Chinese Character Recognition With Smartwatch. IEEE Internet Things J. 7(2): 960-970 (2020) - [j35]Yanjiao Chen, Xueluan Gong, Runmin Ou, Lingjie Duan, Qian Zhang:
Crowdcaching: Incentivizing D2D-Enabled Caching via Coalitional Game for IoT. IEEE Internet Things J. 7(6): 5599-5612 (2020) - [j34]Xuyang Ding, Xin Tian, Xiaohui Liu, Yanjiao Chen:
PP-SPEC: Securing Spectrum Allocation for Internet of Things. IEEE Internet Things J. 7(11): 10826-10836 (2020) - [j33]Xiuwen Liu, Jianming Fu, Yanjiao Chen:
Event evolution model for cybersecurity event mining in tweet streams. Inf. Sci. 524: 254-276 (2020) - [j32]Yanjiao Chen, Xueluan Gong, Qian Wang, Xing Di, Huayang Huang:
Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments. IEEE Netw. 34(5): 141-147 (2020) - [j31]Lingchen Zhao, Qian Wang, Qin Zou, Yan Zhang, Yanjiao Chen:
Privacy-Preserving Collaborative Deep Learning With Unreliable Participants. IEEE Trans. Inf. Forensics Secur. 15: 1486-1500 (2020) - [j30]Libing Wu, Jingxiao Yang, Man Zhou, Yanjiao Chen, Qian Wang:
LVID: A Multimodal Biometrics Authentication System on Smartphones. IEEE Trans. Inf. Forensics Secur. 15: 1572-1585 (2020) - [j29]Yanjiao Chen, Long Lin, Baochun Li:
Razor: Scaling Backend Capacity for Mobile Applications. IEEE Trans. Mob. Comput. 19(7): 1702-1714 (2020) - [j28]Shuangke Wu, Yanjiao Chen, Minghui Li, Xiangyang Luo, Zhe Liu, Lan Liu:
Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools. IEEE/ACM Trans. Netw. 28(2): 874-887 (2020) - [j27]Mengnian Xu, Yanjiao Chen, Wei Wang:
A Two-Stage Game Framework to Secure Transmission in Two-Tier UAV Networks. IEEE Trans. Veh. Technol. 69(11): 13728-13740 (2020) - [j26]Yang Yang, Yanjiao Chen, Wei Wang, Gang Yang:
Securing Channel State Information in Multiuser MIMO With Limited Feedback. IEEE Trans. Wirel. Commun. 19(5): 3091-3103 (2020) - [c34]Dongxiao Jiang, Chenggang Li, Lixin Ma, Xiaoyu Ji, Yanjiao Chen, Bo Li:
ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse Engineering. BigDataSecurity/HPSC/IDS 2020: 19-23 - [c33]Salma Emara, Baochun Li, Yanjiao Chen:
Eagle: Refining Congestion Control by Learning from the Experts. INFOCOM 2020: 676-685 - [i2]Mengnian Xu, Yanjiao Chen, Wei Wang:
A Two-stage Game Framework to Secure Transmission in Two-Tier UAV Networks. CoRR abs/2009.09887 (2020)
2010 – 2019
- 2019
- [j25]Libing Wu, Zhijuan He, Yanjiao Chen, Dan Wu, Jianqun Cui:
Brainstorming-Based Ant Colony Optimization for Vehicle Routing With Soft Time Windows. IEEE Access 7: 19643-19652 (2019) - [j24]Xiaoyan Yin, Ruzhao Jia, Yanjiao Chen, Miao Pan:
Cooperative Transmission With Priority and Fairness in Edge Computing Systems. IEEE Access 7: 44059-44069 (2019) - [j23]Qian Wang, Jing Huang, Yanjiao Chen, Cong Wang, Fu Xiao, Xiangyang Luo:
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation. IEEE Trans. Inf. Forensics Secur. 14(2): 374-386 (2019) - [j22]Shuangke Wu, Yanjiao Chen, Qian Wang, Minghui Li, Cong Wang, Xiangyang Luo:
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction. IEEE Trans. Inf. Forensics Secur. 14(7): 1687-1701 (2019) - [j21]Man Zhou, Qian Wang, Kui Ren, Dimitrios Koutsonikolas, Lu Su, Yanjiao Chen:
Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones. IEEE Trans. Mob. Comput. 18(3): 560-573 (2019) - [j20]Yanjiao Chen, Xin Tian, Qian Wang, Minghui Li, Minxin Du, Qi Li:
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum. IEEE Trans. Mob. Comput. 18(10): 2270-2284 (2019) - [j19]Yanjiao Chen, Xu Wang, Baochun Li, Qian Zhang:
An Incentive Mechanism for Crowdsourcing Systems with Network Effects. ACM Trans. Internet Techn. 19(4): 49:1-49:21 (2019) - [j18]Qian Wang, Jing Huang, Yanjiao Chen, Xin Tian, Qian Zhang:
Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum. IEEE/ACM Trans. Netw. 27(2): 848-861 (2019) - [j17]Yanjiao Chen, Zhuo Ma, Qian Wang, Jing Huang, Xin Tian, Qian Zhang:
Privacy-Preserving Spectrum Auction Design: Challenges, Solutions, and Research Directions. IEEE Wirel. Commun. 26(5): 142-150 (2019) - [c32]Runmin Ou, Fang Peng, Taige Zhang, Jiawei Li, Jincao Xu, Yanjiao Chen, Xiaoyan Yin:
WatchOUT: A Practical Secure Pedestrian Warning System Based on Smartphones. GLOBECOM 2019: 1-6 - [c31]Yanjiao Chen, Yuxuan Xiong, Bulou Liu, Xiaoyan Yin:
TranGAN: Generative Adversarial Network Based Transfer Learning for Social Tie Prediction. ICC 2019: 1-6 - [c30]Jian Zhang, Hongliang Bi, Yanjiao Chen, Jiale Chen, Zhihang Wei:
SmartWriting: Pen-Holding Gesture Recognition with Smartwatch. ICC 2019: 1-6 - [c29]Qian Wang, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo:
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. INFOCOM 2019: 2062-2070 - 2018
- [j16]Qian Wang, Minxin Du, Xiuying Chen, Yanjiao Chen, Pan Zhou, Xiaofeng Chen, Xinyi Huang:
Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training. IEEE Trans. Knowl. Data Eng. 30(12): 2381-2393 (2018) - [j15]Yanjiao Chen, Yuxuan Xiong, Qian Wang, Xiaoyan Yin, Baochun Li:
Ensuring Minimum Spectrum Requirement in Matching-Based Spectrum Allocation. IEEE Trans. Mob. Comput. 17(9): 2028-2040 (2018) - [j14]Yanjiao Chen, Xiaoyan Yin:
Joint Price Competition and Resource Allocation for Duopoly Femtocell Market. IEEE Trans. Veh. Technol. 67(3): 2491-2500 (2018) - [j13]Yanjiao Chen, Lingjie Duan, Qian Zhang:
Financial Analysis of Network Upgrade. IEEE Trans. Veh. Technol. 67(6): 5496-5499 (2018) - [c28]Xiaoyan Yin, Yanjiao Chen, Xiaoqian Mi, Hua Wang, Zhangyong Tang, Chen He, Dingyi Fang:
Time Context-Aware IPTV Program Recommendation Based on Tensor Learning. GLOBECOM 2018: 1-6 - [c27]Yanjiao Chen, Long Lin, Guiyan Cao, Zhenzhong Chen, Baochun Li:
Stable Combinatorial Spectrum Matching. INFOCOM 2018: 1664-1672 - [c26]Lingchen Zhao, Lihao Ni, Shengshan Hu, Yanjiao Chen, Pan Zhou, Fu Xiao, Libing Wu:
InPrivate Digging: Enabling Tree-based Distributed Data Mining with Differential Privacy. INFOCOM 2018: 2087-2095 - [c25]Minghui Li, Mingxue Zhang, Qian Wang, Sherman S. M. Chow, Minxin Du, Yanjiao Chen, Chenliang Li:
InstantCryptoGram: Secure Image Retrieval Service. INFOCOM 2018: 2222-2230 - [i1]Lingchen Zhao, Qian Wang, Qin Zou, Yan Zhang, Yanjiao Chen:
Privacy-Preserving Collaborative Deep Learning with Unreliable Participants. CoRR abs/1812.10113 (2018) - 2017
- [j12]Lin Yang, Mingxuan Yuan, Yanjiao Chen, Wei Wang, Qian Zhang, Jia Zeng:
Personalized user engagement modeling for mobile videos. Comput. Networks 126: 256-267 (2017) - [j11]Jian Zhang, Yang Yang, Yanjiao Chen, Jing Chen, Qian Zhang:
A general framework to design secure cloud storage protocol using homomorphic encryption scheme. Comput. Networks 129: 37-50 (2017) - [j10]Yanjiao Chen, Xiaoyan Yin, Jin Zhang:
A Reverse Auction Framework for Hybrid Access in Femtocell Network. J. Comput. Sci. Technol. 32(6): 1250-1264 (2017) - [c24]Yanjiao Chen, Xiaoyan Yin:
Stable Job Assignment for Crowdsourcing. GLOBECOM 2017: 1-6 - [c23]Zhenyu Ju, Chuanhe Huang, Yanjiao Chen, Lin Ma:
A truthful auction mechanism for resource provisioning in mobile crowdsensing. IPCCC 2017: 1-8 - [c22]Jian Zhang, Yang Yang, Yanjiao Chen, Fei Chen:
A secure cloud storage system based on discrete logarithm problem. IWQoS 2017: 1-10 - [c21]Xiaoyan Yin, Yanjiao Chen, Baochun Li:
Task assignment with guaranteed quality for crowdsourcing platforms. IWQoS 2017: 1-10 - [c20]Yanjiao Chen, Yuxuan Xiong, Qian Wang, Xiaoyan Yin, Baochun Li:
Stable Matching for Spectrum Market with Guaranteed Minimum Requirement. MobiHoc 2017: 4:1-4:10 - [c19]Yanjiao Chen, Zixuan Yu, Baochun Li:
Clockwork: Scheduling Cloud Requests in Mobile Applications. SECON 2017: 1-9 - 2016
- [c18]Linshan Jiang, Haofan Cai, Yanjiao Chen, Jin Zhang, Baochun Li:
Many-to-many matching for combinatorial spectrum trading. ICC 2016: 1-6 - [c17]Haofan Cai, Linshan Jiang, Yanjiao Chen, Jin Zhang, Baochun Li:
Multi-seller combinatorial spectrum auction with reserve prices. ICCS 2016: 1-6 - [c16]Yanjiao Chen, Linshan Jiang, Haofan Cai, Jin Zhang, Baochun Li:
Spectrum Matching. ICDCS 2016: 590-599 - [c15]Yanjiao Chen, Baochun Li, Qian Zhang:
Incentivizing crowdsourcing systems with network effects. INFOCOM 2016: 1-9 - 2015
- [b1]Yanjiao Chen, Qian Zhang:
Dynamic Spectrum Auction in Wireless Communication. Springer Briefs in Electrical and Computer Engineering, Springer 2015, ISBN 978-3-319-14029-2, pp. 1-54 - [j9]Wei Wang, Linlin Yang, Yanjiao Chen, Qian Zhang:
A privacy-aware framework for targeted advertising. Comput. Networks 79: 17-29 (2015) - [j8]Yanjiao Chen, Qihong Chen, Fan Zhang, Qian Zhang, Kaishun Wu, Ruochen Huang, Liang Zhou:
Understanding viewer engagement of video service in Wi-Fi network. Comput. Networks 91: 101-116 (2015) - [j7]Yanjiao Chen, Kaishun Wu, Qian Zhang:
From QoS to QoE: A Tutorial on Video Quality Assessment. IEEE Commun. Surv. Tutorials 17(2): 1126-1165 (2015) - [j6]Yanjiao Chen, Lingjie Duan, Jianwei Huang, Qian Zhang:
Balancing Income and User Utility in Spectrum Allocation. IEEE Trans. Mob. Comput. 14(12): 2460-2473 (2015) - [j5]Yanjiao Chen, Peng Lin, Qian Zhang:
LOTUS: Location-Aware Online Truthful Double Auction for Dynamic Spectrum Access. IEEE Trans. Wirel. Commun. 14(2): 1092-1099 (2015) - [c14]Yanjiao Chen, Fan Zhang, Kaishun Wu, Qian Zhang:
QoE-Aware Dynamic Video Rate Adaptation. GLOBECOM 2015: 1-6 - [c13]Zhe Lin, Jin Zhang, Yanjiao Chen, Qian Zhang:
Heart rate estimation using wrist-acquired photoplethysmography under different types of daily life motion artifact. ICC 2015: 489-494 - [c12]Yanjiao Chen, Lingjie Duan, Qian Zhang:
Financial analysis of 4G network deployment. INFOCOM 2015: 1607-1615 - 2014
- [j4]Yanjiao Chen, Jin Zhang, Kaishun Wu, Qian Zhang:
TAMES: A Truthful Double Auction for Multi-Demand Heterogeneous Spectrums. IEEE Trans. Parallel Distributed Syst. 25(11): 3012-3024 (2014) - [c11]Yanjiao Chen, Peng Lin, Qian Zhang:
LOTUS: Location-aware online truthful double auction for dynamic spectrum access. DySPAN 2014: 510-518 - [c10]Yanjiao Chen, Jin Zhang, Qian Zhang, Kaishun Wu:
A Bayesian game model for joint pricing and spectrum allocation strategy of femtocell service providers. ICC 2014: 2532-2537 - 2013
- [c9]Linlin Yang, Wei Wang, Yanjiao Chen, Qian Zhang:
A privacy-aware framework for online advertisement targeting. GLOBECOM 2013: 3145-3150 - [c8]Yanjiao Chen, Jin Zhang, Qian Zhang:
Incentive mechanism for hybrid access in femtocell network with traffic uncertainty. ICC 2013: 6333-6337 - [c7]Yanjiao Chen, Jin Zhang, Kaishun Wu, Qian Zhang:
TAMES: A Truthful Auction Mechanism for heterogeneous spectrum allocation. INFOCOM 2013: 180-184 - [c6]Yanjiao Chen, Lingjie Duan, Jianwei Huang, Qian Zhang:
Balance of revenue and social welfare in FCC's spectrum allocation. INFOCOM 2013: 2004-2012 - 2012
- [j3]Yanjiao Chen, Jin Zhang, Qian Zhang:
Utility-Aware Refunding Framework for Hybrid Access Femtocell Network. IEEE Trans. Wirel. Commun. 11(5): 1688-1697 (2012) - [j2]Xiaojun Feng, Yanjiao Chen, Jin Zhang, Qian Zhang, Bo Li:
TAHES: A Truthful Double Auction Mechanism for Heterogeneous Spectrums. IEEE Trans. Wirel. Commun. 11(11): 4038-4047 (2012) - [c5]Richard Southwell, Yanjiao Chen, Jianwei Huang, Qian Zhang:
Convergence Dynamics of Graphical Congestion Games. GAMENETS 2012: 31-46 - [c4]Yanjiao Chen, Qian Zhang:
An economic framework for Information Platform. GLOBECOM 2012: 2078-2082 - [c3]Yanjiao Chen, Jin Zhang, Qian Zhang, Juncheng Jia:
A reverse auction framework for access permission transaction to promote hybrid access in femtocell network. INFOCOM 2012: 2761-2765 - [c2]Xiaojun Feng, Yanjiao Chen, Jin Zhang, Qian Zhang, Bo Li:
TAHES: Truthful double Auction for Heterogeneous Spectrums. INFOCOM 2012: 3076-3080 - 2011
- [j1]Peng Lin, Jin Zhang, Yanjiao Chen, Qian Zhang:
Macro-femto heterogeneous network deployment and management: from business models to technical solutions. IEEE Wirel. Commun. 18(3): 64-70 (2011) - [c1]Yanjiao Chen, Jin Zhang, Peng Lin, Qian Zhang:
Optimal Pricing and Spectrum Allocation for Wireless Service Provider on Femtocell Deployment. ICC 2011: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-02 15:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint