default search action
Jeff Yan
Person information
- affiliation: Newcastle University, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i10]Aurélien Bourquard, Jeff Yan:
Wallcamera: Reinventing the Wheel? CoRR abs/2407.16015 (2024) - 2023
- [i9]Ping Wang, Shishir Nagaraja, Aurélien Bourquard, Haichang Gao, Jeff Yan:
SoK: Acoustic Side Channels. CoRR abs/2308.03806 (2023) - 2022
- [i8]Jeff Yan, Dearbhla McCabe:
Gender Bias in Password Managers. CoRR abs/2206.14136 (2022) - [i7]Aurélien Bourquard, Jeff Yan:
Differential Imaging Forensics: A Feasibility Study. CoRR abs/2207.04548 (2022) - 2021
- [c47]Yipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan:
Research on the Security of Visual Reasoning CAPTCHA. USENIX Security Symposium 2021: 3291-3308 - 2020
- [j7]Peng Cheng, Ibrahim Ethem Bagci, Utz Roedig, Jeff Yan:
SonarSnoop: active acoustic side-channel attacks. Int. J. Inf. Sec. 19(2): 213-228 (2020) - [i6]Jeff Yan:
Scams in modern societies: how does China differ from the world? CoRR abs/2012.14867 (2020)
2010 – 2019
- 2019
- [c46]Peng Cheng, Ibrahim Ethem Bagci, Jeff Yan, Utz Roedig:
Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants. IEEE Symposium on Security and Privacy Workshops 2019: 144-149 - [i5]Ilia Shumailov, Laurent Simon, Jeff Yan, Ross Anderson:
Hearing your touch: A new acoustic side channel on smartphones. CoRR abs/1903.11137 (2019) - [i4]Jeff Yan:
From Sicilian mafia to Chinese "scam villages". CoRR abs/1905.03108 (2019) - [i3]Aurélien Bourquard, Jeff Yan:
Differential Imaging Forensics. CoRR abs/1906.05268 (2019) - 2018
- [c45]Peng Cheng, Ibrahim Ethem Bagci, Jeff Yan, Utz Roedig:
Towards Reactive Acoustic Jamming for Personal Voice Assistants. MPS@CCS 2018: 12-17 - [c44]Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang:
A Security Analysis of Honeywords. NDSS 2018 - [c43]Jeff Yan:
How Does Match-Fixing Inform Computer Game Security? Security Protocols Workshop 2018: 166-170 - [c42]Jeff Yan:
How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion). Security Protocols Workshop 2018: 171-178 - [i2]Peng Cheng, Ibrahim Ethem Bagci, Utz Roedig, Jeff Yan:
SonarSnoop: Active Acoustic Side-Channel Attacks. CoRR abs/1808.10250 (2018) - 2017
- [c41]Zhichao Tan, Khiem Nguyen, Jeff Yan, Howard Samuels, Shane Keating, Paul Crocker, Bill Clark:
A dual-axis MEMS vibratory gyroscope ASIC with 0.0061°/s/VHz noise floor over 480 Hz bandwidth. A-SSCC 2017: 21-24 - [c40]Jeff Yan, Aurélien Bourquard:
POSTER: Who was Behind the Camera? - Towards Some New Forensics. CCS 2017: 2595-2597 - 2016
- [c39]Abdalnaser Algwil, Dan Ciresan, Bei-Bei Liu, Jeff Yan:
A security analysis of automated chinese turing tests. ACSAC 2016: 520-532 - [c38]Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang:
Targeted Online Password Guessing: An Underestimated Threat. CCS 2016: 1242-1254 - [c37]Abdalnaser Algwil, Jeff Yan:
Failures of Security APIs: A New Case. Financial Cryptography 2016: 283-298 - [c36]Xingjie Wei, Jussi Palomäki, Jeff Yan, Peter Robinson:
The Science and Detection of Tilting. ICMR 2016: 79-86 - [c35]Haichang Gao, Jeff Yan, Fang Cao, Zhengya Zhang, Lei Lei, Mengyun Tang, Ping Zhang, Xin Zhou, Xuqin Wang, Jiawei Li:
A Simple Generic Attack on Text Captchas. NDSS 2016 - [c34]Jeff Yan:
Novel Security and Privacy Perspectives of Camera Fingerprints. Security Protocols Workshop 2016: 90-95 - [c33]Jeff Yan:
Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion). Security Protocols Workshop 2016: 96-102 - [c32]Andrew Ruddick, Jeff Yan:
Acceleration Attacks on PBKDF2: Or, What Is inside the Black-Box of oclHashcat? WOOT 2016 - 2015
- [c31]Bei-Bei Liu, Xingjie Wei, Jeff Yan:
Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation. IH&MMSec 2015: 85-90 - [c30]Anjan Kumar, Abhinav Dikshit, Bill Clark, Jeff Yan:
A Frequency Scan Scheme for PLL-Based Locking to High-Q MEMS Resonators. VLSID 2015: 71-74 - 2014
- [j6]Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, Ning Xu:
Captcha as Graphical Passwords - A New Security Primitive Based on Hard AI Problems. IEEE Trans. Inf. Forensics Secur. 9(6): 891-904 (2014) - [c29]Bin B. Zhu, Jeff Yan, Dongchen Wei, Maowei Yang:
Security Analyses of Click-based Graphical Passwords via Image Point Memorability. CCS 2014: 1217-1231 - 2013
- [c28]Haichang Gao, Wei Wang, Jiao Qi, Xuqin Wang, Xiyang Liu, Jeff Yan:
The robustness of hollow CAPTCHAs. CCS 2013: 1075-1086 - [c27]Bin B. Zhu, Jeff Yan:
Towards New Security Primitives Based on Hard AI Problems. Security Protocols Workshop 2013: 3-10 - [c26]Jeff Yan:
Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion). Security Protocols Workshop 2013: 11-18 - [c25]Bin B. Zhu, Dongchen Wei, Maowei Yang, Jeff Yan:
Security implications of password discretization for click-based graphical passwords. WWW 2013: 1581-1591 - 2012
- [j5]Ahmad Salah El Ahmad, Jeff Yan, Wai-Yin Ng:
CAPTCHA Design: Color, Usability, and Security. IEEE Internet Comput. 16(2): 44-51 (2012) - [c24]Su-Yang Yu, Nils Y. Hammerla, Jeff Yan, Peter Andras:
Aimbot Detection in Online FPS Games Using a Heuristic Method Based on Distribution Comparison Matrix. ICONIP (5) 2012: 654-661 - [c23]Su-Yang Yu, Nils Y. Hammerla, Jeff Yan, Peter Andras:
A statistical aimbot detection method for online FPS games. IJCNN 2012: 1-8 - 2011
- [c22]Jeff Yan:
System Security Research at Newcastle. SysSec@DIMVA 2011: 94-95 - [c21]Nur Haryani Zakaria, David Griffiths, Sacha Brostoff, Jeff Yan:
Shoulder surfing defence for recall-based graphical passwords. SOUPS 2011: 6 - 2010
- [c20]Jeff Yan:
Collusion Detection in Online Bridge. AAAI 2010: 1510-1515 - [c19]Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, Ning Xu, Meng Yi, Kaiwei Cai:
Attacks and design of image recognition CAPTCHAs. CCS 2010: 187-200 - [c18]Ahmad Salah El Ahmad, Jeff Yan, Lindsay F. Marshall:
The robustness of a new CAPTCHA. EUROSEC 2010: 36-41 - [c17]Su-Yang Yu, Jeff Yan:
Security Design in Human Computation Games. Security Protocols Workshop 2010: 142-153 - [c16]Jeff Yan:
Security Design in Human Computation Games (Transcript of Discussion). Security Protocols Workshop 2010: 154-160
2000 – 2009
- 2009
- [j4]Jeff Jianxin Yan, Brian Randell:
An Investigation of Cheating in Online Games. IEEE Secur. Priv. 7(3): 37-44 (2009) - [j3]Jeff Yan, Ahmad Salah El Ahmad:
CAPTCHA Security: A Case Study. IEEE Secur. Priv. 7(4): 22-28 (2009) - [c15]Jeff Yan, Su-Yang Yu:
Streamlining Attacks on CAPTCHAs with a Computer Game. IJCAI 2009: 2095-2100 - [c14]Jeff Yan, Su-Yang Yu:
Magic Bullet: a dual-purpose computer game. KDD Workshop on Human Computation 2009: 32-33 - 2008
- [c13]Jeff Yan, Ahmad Salah El Ahmad:
A low-cost attack on a Microsoft captcha. CCS 2008: 543-554 - [c12]Jeff Yan, Ahmad Salah El Ahmad:
Usability of CAPTCHAs or usability issues in CAPTCHA design. SOUPS 2008: 44-52 - 2007
- [c11]Jeff Yan, Ahmad Salah El Ahmad:
Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms. ACSAC 2007: 279-291 - [c10]Paul Dunphy, Jeff Yan:
Do background images improve "draw a secret" graphical passwords? CCS 2007: 36-47 - [c9]Di Lin, Paul Dunphy, Patrick Olivier, Jeff Yan:
Graphical passwords & qualitative spatial relations. SOUPS 2007: 161-162 - [c8]Paul Dunphy, Jeff Yan:
Is FacePIN secure and usable? SOUPS 2007: 165-166 - 2006
- [c7]Jeff Yan, Pook Leong Cho:
Enhancing Collaborative Spam Detection with Bloom Filters. ACSAC 2006: 414-428 - [c6]Siu Fung Yeung, John C. S. Lui, Jiangchuan Liu, Jeff Yan:
Detecting cheaters for multiplayer games: theory, design and implementation[1]. CCNC 2006: 1178-1182 - [c5]Jeff Yan:
Bot, Cyborg and Automated Turing Test. Security Protocols Workshop 2006: 190-197 - [c4]Jeff Yan:
Bot, Cyborg and Automated Turing Test. Security Protocols Workshop 2006: 198-201 - 2005
- [c3]Jeff Jianxin Yan, Brian Randell:
A systematic classification of cheating in online games. NETGAMES 2005: 1-9 - 2004
- [j2]Jeff Jianxin Yan, Alan F. Blackwell, Ross J. Anderson, Alasdair Grant:
Password Memorability and Security: Empirical Results. IEEE Secur. Priv. 2(5): 25-31 (2004) - 2003
- [c2]Jeff Jianxin Yan:
Security Design in Online Games. ACSAC 2003: 286-295 - 2002
- [j1]Jeff Jianxin Yan, Hyun-Jin Choi:
Security issues in online games. Electron. Libr. 20(2): 125-133 (2002) - 2001
- [c1]Jeff Jianxin Yan:
A note on proactive password checking. NSPW 2001: 127-135 - [i1]Jeff Jianxin Yan, Yongdong Wu:
An Attack on A Traitor Tracing Scheme. IACR Cryptol. ePrint Arch. 2001: 67 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-20 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint