Seguir
Chen Wang
Título
Citado por
Citado por
Año
Wireless sensing for human activity: A survey
J Liu, H Liu, Y Chen, Y Wang, C Wang
IEEE Communications Surveys & Tutorials 22 (3), 1629-1645, 2019
2632019
Friend or foe? Your wearable devices reveal your personal pin
C Wang, X Guo, Y Wang, Y Chen, B Liu
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
1622016
Fine-grained sleep monitoring: Hearing your breathing with smartphones
Y Ren, C Wang, J Yang, Y Chen
2015 IEEE Conference on Computer Communications (INFOCOM), 1194-1202, 2015
1252015
User authentication on mobile devices: Approaches, threats and trends
C Wang, Y Wang, Y Chen, H Liu, J Liu
Computer Networks 170, 107118, 2020
1052020
VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration
J Liu, C Wang, Y Chen, N Saxena
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
962017
Towards in-baggage suspicious object detection using commodity wifi
C Wang, J Liu, Y Chen, H Liu, Y Wang
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
652018
Locating rogue access point using fine-grained channel information
C Wang, X Zheng, Y Chen, J Yang
IEEE Transactions on Mobile Computing 16 (9), 2560-2573, 2016
452016
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations
C Wang, SA Anand, J Liu, P Walker, Y Chen, N Saxena
Proceedings of the 35th Annual Computer Security Applications Conference, 42-56, 2019
402019
Accurate rogue access point localization leveraging fine-grained channel information
X Zheng, C Wang, Y Chen, J Yang
2014 IEEE conference on communications and network security, 211-219, 2014
332014
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers
SA Anand, C Wang, J Liu, N Saxena, Y Chen
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
312021
Signature verification using critical segments for securing mobile transactions
Y Ren, C Wang, Y Chen, MC Chuah, J Yang
IEEE Transactions on Mobile Computing 19 (3), 724-739, 2019
312019
Personal PIN leakage from wearable devices
C Wang, X Guo, Y Chen, Y Wang, B Liu
IEEE Transactions on Mobile Computing 17 (3), 646-660, 2017
282017
Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers
SA Anand, C Wang, J Liu, N Saxena, Y Chen
arXiv preprint arXiv:1907.05972, 2019
272019
Noninvasive fine-grained sleep monitoring leveraging smartphones
Y Ren, C Wang, Y Chen, J Yang, H Li
IEEE Internet of Things Journal 6 (5), 8248-8261, 2019
242019
Critical segment based real-time e-signature for securing mobile transactions
Y Ren, C Wang, Y Chen, MC Chuah, J Yang
2015 IEEE Conference on Communications and Network Security (CNS), 7-15, 2015
242015
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training
C Shi, Y Wang, Y Chen, N Saxena, C Wang*
Annual Computer Security Applications Conference, 829-842, 2020
23*2020
Wristspy: Snooping passcodes in mobile payment using wrist-worn wearables
C Wang, J Liu, X Guo, Y Wang, Y Chen
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2071-2079, 2019
212019
Systems and methods for user input and authentication using vibration analysis
C YingYing, J Liu, C Wang, N Saxena
US Patent 11,461,442, 2022
202022
WiEat: Fine-grained device-free eating monitoring leveraging Wi-Fi signals
Z Lin, Y Xie, X Guo, Y Ren, Y Chen, C Wang
2020 29th International Conference on Computer Communications and Networks …, 2020
192020
Poster: Hearing your breathing: fine-grained sleep monitoring using smartphones
Y Ren, C Wang, Y Chen, J Yang
Proceedings of the 20th annual international conference on Mobile computing …, 2014
172014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20