Friend or foe? Your wearable devices reveal your personal pin C Wang, X Guo, Y Wang, Y Chen, B Liu Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 131 | 2016 |
Wireless sensing for human activity: A survey J Liu, H Liu, Y Chen, Y Wang, C Wang IEEE Communications Surveys & Tutorials 22 (3), 1629-1645, 2019 | 99 | 2019 |
Fine-grained sleep monitoring: Hearing your breathing with smartphones Y Ren, C Wang, J Yang, Y Chen 2015 IEEE Conference on Computer Communications (INFOCOM), 1194-1202, 2015 | 96 | 2015 |
Vibwrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration J Liu, C Wang, Y Chen, N Saxena Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 56 | 2017 |
Towards in-baggage suspicious object detection using commodity wifi C Wang, J Liu, Y Chen, H Liu, Y Wang 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 41 | 2018 |
User authentication on mobile devices: Approaches, threats and trends C Wang, Y Wang, Y Chen, H Liu, J Liu Computer Networks 170, 107118, 2020 | 38 | 2020 |
Locating rogue access point using fine-grained channel information C Wang, X Zheng, Y Chen, J Yang IEEE Transactions on Mobile Computing 16 (9), 2560-2573, 2016 | 35 | 2016 |
Accurate rogue access point localization leveraging fine-grained channel information X Zheng, C Wang, Y Chen, J Yang 2014 IEEE conference on communications and network security, 211-219, 2014 | 29 | 2014 |
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations C Wang, SA Anand, J Liu, P Walker, Y Chen, N Saxena Proceedings of the 35th Annual Computer Security Applications Conference, 42-56, 2019 | 23 | 2019 |
Personal PIN leakage from wearable devices C Wang, X Guo, Y Chen, Y Wang, B Liu IEEE Transactions on Mobile Computing 17 (3), 646-660, 2017 | 21 | 2017 |
Critical segment based real-time e-signature for securing mobile transactions Y Ren, C Wang, Y Chen, MC Chuah, J Yang 2015 IEEE Conference on Communications and Network Security (CNS), 7-15, 2015 | 18 | 2015 |
Noninvasive fine-grained sleep monitoring leveraging smartphones Y Ren, C Wang, Y Chen, J Yang, H Li IEEE Internet of Things Journal 6 (5), 8248-8261, 2019 | 16 | 2019 |
Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers SA Anand, C Wang, J Liu, N Saxena, Y Chen arXiv preprint arXiv:1907.05972, 2019 | 15 | 2019 |
Signature verification using critical segments for securing mobile transactions Y Ren, C Wang, Y Chen, MC Chuah, J Yang IEEE Transactions on Mobile Computing 19 (3), 724-739, 2019 | 13 | 2019 |
Poster: Hearing your breathing: fine-grained sleep monitoring using smartphones Y Ren, C Wang, Y Chen, J Yang Proceedings of the 20th annual international conference on Mobile computing …, 2014 | 13 | 2014 |
WristSpy: Snooping passcodes in mobile payment using wrist-worn wearables C Wang, J Liu, X Guo, Y Wang, Y Chen IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2071-2079, 2019 | 11 | 2019 |
WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi Signals Z Lin, Y Xie, X Guo, Y Ren, Y Chen, C Wang 2020 29th International Conference on Computer Communications and Networks …, 2020 | 8 | 2020 |
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training C Shi, Y Wang, Y Chen, N Saxena, C Wang* Annual Computer Security Applications Conference, 829-842, 2020 | 7* | 2020 |
Smartphone privacy leakage of social relationships and demographics from surrounding access points C Wang, C Wang, Y Chen, L Xie, S Lu 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 7 | 2017 |
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers SA Anand, C Wang, J Liu, N Saxena, Y Chen Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 6 | 2021 |