Home > Research > Researchers > Dr Jeff Yan > Publications

Dr Jeff Yan

Formerly at Lancaster University

  1. Published

    Security analyses of click-based graphical passwords via image point memorability

    Zhu, B. B., Yan, J., Yang, M. & Wei, D., 3/11/2014, CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1217-1231 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Security implications of password discretization for click-based graphical passwords

    Zhu, B. B., Wei, D., Yang, M. & Yan, J., 05/2013, WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web. New York: ACM, p. 1581-1591 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Towards new security primitives based on hard AI problems

    Zhu, B. B. & Yan, J., 2013, Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Christianson, B., Malcolm, J., Stajano, F., Anderson, J. & Bonneau, J. (eds.). Berlin: Springer Verlag, p. 3-10 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8263).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Captcha as graphical passwords: a new security primitive based on hard AI problems

    Zhu, B. B., Yan, J., Bao, G., Yang, M. & Xu, N., 2014, In: IEEE Transactions on Information Forensics and Security. 9, 6, p. 891-904 14 p., 6775249.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Attacks and design of image recognition CAPTCHAs

    Zhu, B. B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M. & Cai, K., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 187-200 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    Shoulder surfing defence for recall-based graphical passwords

    Zakaria, N. H., Griffiths, D., Brostoff, S. & Yan, J., 2011, SOUPS 2011 - Proceedings of the 7th Symposium on Usable Privacy and Security. New York: ACM, 6

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Security design in human computation games

    Yu, S. Y. & Yan, J., 2014, Security Protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 142-153 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A statistical aimbot detection method for online FPS games

    Yu, S. Y., Hammerla, N., Yan, J. & Andras, P., 2012, Proceedings of the International Joint Conference on Neural Networks (IJCNN). IEEE, p. 1-8 8 p. 6252489

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Aimbot detection in online FPS games using a heuristic method based on distribution comparison matrix

    Yu, S. Y., Hammerla, N., Yan, J. & Andras, P., 2012, Neural Information Processing: 19th International Conference, ICONIP 2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part V. Huang, T., Zeng, Z., Li, C. & Leung, C. S. (eds.). Berlin: Springer Verlag, p. 654-661 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7667 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Detecting cheaters for multiplayer games: theory, design and implementation

    Yeung, S. F., Lui, J. C. S., Liu, J. & Yan, J., 2006, 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006. IEEE, p. 1178-1182 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Previous 1 2 3 4 5 Next

Back to top