Chen Wang
Title
Cited by
Cited by
Year
Friend or foe? Your wearable devices reveal your personal pin
C Wang, X Guo, Y Wang, Y Chen, B Liu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
1102016
Fine-grained sleep monitoring: Hearing your breathing with smartphones
Y Ren, C Wang, J Yang, Y Chen
2015 IEEE Conference on Computer Communications (INFOCOM), 1194-1202, 2015
742015
Wireless sensing for human activity: A survey
J Liu, H Liu, Y Chen, Y Wang, C Wang
IEEE Communications Surveys & Tutorials 22 (3), 1629-1645, 2019
452019
VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration
J Liu, C Wang, Y Chen, N Saxena
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
342017
Accurate rogue access point localization leveraging fine-grained channel information
X Zheng, C Wang, Y Chen, J Yang
2014 IEEE conference on communications and network security, 211-219, 2014
282014
Towards in-baggage suspicious object detection using commodity WiFi
C Wang, J Liu, Y Chen, H Liu, Y Wang
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
262018
Locating rogue access point using fine-grained channel information
C Wang, X Zheng, Y Chen, J Yang
IEEE Transactions on Mobile Computing 16 (9), 2560-2573, 2016
252016
Personal PIN leakage from wearable devices
C Wang, X Guo, Y Chen, Y Wang, B Liu
IEEE Transactions on Mobile Computing 17 (3), 646-660, 2017
182017
Critical segment based real-time e-signature for securing mobile transactions
Y Ren, C Wang, Y Chen, MC Chuah, J Yang
2015 IEEE Conference on Communications and Network Security (CNS), 7-15, 2015
162015
User authentication on mobile devices: Approaches, threats and trends
C Wang, Y Wang, Y Chen, H Liu, J Liu
Computer Networks 170, 107118, 2020
132020
Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers
SA Anand, C Wang, J Liu, N Saxena, Y Chen
arXiv preprint arXiv:1907.05972, 2019
122019
Poster: Hearing your breathing: fine-grained sleep monitoring using smartphones
Y Ren, C Wang, Y Chen, J Yang
Proceedings of the 20th annual international conference on Mobile computing …, 2014
122014
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations
C Wang, SA Anand, J Liu, P Walker, Y Chen, N Saxena
Proceedings of the 35th Annual Computer Security Applications Conference, 42-56, 2019
102019
Signature verification using critical segments for securing mobile transactions
Y Ren, C Wang, Y Chen, MC Chuah, J Yang
IEEE Transactions on Mobile Computing 19 (3), 724-739, 2019
82019
Noninvasive fine-grained sleep monitoring leveraging smartphones
Y Ren, C Wang, Y Chen, J Yang, H Li
IEEE Internet of Things Journal 6 (5), 8248-8261, 2019
62019
Smartphone privacy leakage of social relationships and demographics from surrounding access points
C Wang, C Wang, Y Chen, L Xie, S Lu
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
62017
WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi Signals
Z Lin, Y Xie, X Guo, Y Ren, Y Chen, C Wang
2020 29th International Conference on Computer Communications and Networks …, 2020
42020
WristSpy: Snooping passcodes in mobile payment using wrist-worn wearables
C Wang, J Liu, X Guo, Y Wang, Y Chen
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2071-2079, 2019
42019
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training
C Shi, Y Wang, Y Chen, N Saxena, C Wang*
Annual Computer Security Applications Conference, 829-842, 2020
3*2020
A New Algorithm without Exponential and Logarithmic Computations in Iterative Decoding for Double Binary Convolutional Turbo Code
M Zhan, L Zhou, C Wang
2011 7th International Conference on Wireless Communications, Networking and …, 2011
32011
The system can't perform the operation now. Try again later.
Articles 1–20