Publications

You can also find my articles on my Google Scholar profile.

2023

Your Eyes Tell: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing
Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu.
In Oakland’23: IEEE Symposium on Security and Privacy, 2023 (To appear)

Learning Normality Is Enough: A Software-based Mitigation against the Inaudible Voice Attacks
Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu.
In SEC’23: USENIX Security Symposium, 2023 (To appear)

GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI
Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, and Wenyuan Xu.
In SEC’23: USENIX Security Symposium, 2023 (To appear)

PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle
Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, and Wenyuan Xu.
In Oakland’23: IEEE Symposium on Security and Privacy, 2023 (To appear)

DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation
Ruochen Zhou, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichao Chen, and Wenyuan Xu.
In Oakland’23: IEEE Symposium on Security and Privacy, 2023 (To appear)

2022

WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, and Wenyuan Xu.
In Oakland’22: IEEE Symposium on Security and Privacy, 2022 (PDF, Teaser Video)

Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition
Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu.
In SEC’22: USENIX Security Symposium, 2022 (PDF, Slides, Demo)

GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
Kai Wang, Chen Yan, Richard Mitev, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu.
In SEC’22: USENIX Security Symposium, 2022 (PDF, Webpage)

A Survey on Voice Assistant Security: Attacks and Countermeasures
Chen Yan, Xiaoyu Ji, Kai Wang, Qinhong Jiang, Zizhi Jin, Wenyuan Xu.
In CSUR’22: ACM Computing Surveys, 2022 (PDF)

从带内到带外——智能系统的脆弱性体系演变
Wenyuan Xu, Shize Guo, Xiaoyu Ji, and Chen Yan.
In CCCF’22: 中国计算机学会通讯, 18:2, 46-52, 2022 (PDF)

2021

Poltergeist: Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling
Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Kevin Fu, Wenyuan Xu.
In Oakland’21: IEEE Symposium on Security and Privacy, 2021 (PDF, Webpage)

2020

A Nonlinearity-based Secure Face-to-Face Device Authentication for Mobile Devices
Xiaoyu Ji, Xinyan Zhou, Chen Yan, Jiangyi Deng, Wenyuan Xu.
In TMC’20: IEEE Transactions on Mobile Computing, 2020 (PDF)

SoK: A Minimalist Approach to Formalizing Analog Sensor Security
Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu.
In Oakland’20: IEEE Symposium on Security and Privacy, 2020 (PDF, Slides, Talk Video, Teaser Video)

2019

The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification
Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu.
In CCS’19: ACM Conference on Computer and Communications Security, 2019 (PDF, Slides, Webpage)

The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants
Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu.
In TDSC’19: IEEE Transactions on Dependable and Secure Computing, 2019 (PDF)

NAuth: Secure Face-to-Face Device Authentication via Nonlinearity
Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu.
In INFOCOM’19: IEEE Conference on Computer Communications, 2019 (PDF)
Best In-Session Presentation Award

On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion
Chen Yan, Kevin Fu, Wenyuan Xu.
In CBM’19: Computers in Biology and Medicine 104, 2019 (PDF)

2018

Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles
Wenyuan Xu, Chen Yan, Weibin Jia, Xiaoyu Ji, Jiaohao Liu.
In IoTJ’18: IEEE Internet of Things Journal, 5:6, 5015-5029, 2018 (PDF)

On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion
Chen Yan, Kevin Fu, Wenyuan Xu.
University of Michigan Tech Report CSE-TR-001-18 (PDF)

2017

DolphinAttack: Inaudible Voice Commands
Guoming Zhang, Chen Yan (co-first author), Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu.
In CCS’17: ACM Conference on Computer and Communications Security, 2017 (PDF, Slides, Webpage)
Best Paper Award

Cybersecurity and Medical Devices: A Practical Guide for Cardiac Electrophysiologists
Benjamin Ransford, Daniel B. Kramer, Denis Foo Kune, Julio Auto de Medeiros, Chen Yan, Wenyuan Xu, Thomas Crawford, and Kevin Fu.
In PCE’17: Pacing and Clinical Electrophysiology, 40:8, 913-917, 2017 (PDF)

勒索软件:我们如何爬出泥沼
Kevin Fu, Harold Thimbleby, Wenyuan Xu, and Chen Yan.
In CMD’17: 中国医疗设备, 32:7, 167-168, 2017 (PDF)

2016

Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicles
Chen Yan, Wenyuan Xu, and Jianhao Liu.
In DEF CON 24, 2016 (Whitepaper, Slides, Talk Video)
Tesla Security Researcher Hall of Fame

汽车智能化的安全思考
Chen Yan, and Wenyuan Xu.
In CCCF’16: 中国计算机学会通讯, 12:1, 20-27, 2016 (PDF)