Home > Research > Researchers > Dr Jeff Yan > Publications

Dr Jeff Yan

Formerly at Lancaster University

  1. Published

    Security analyses of click-based graphical passwords via image point memorability

    Zhu, B. B., Yan, J., Yang, M. & Wei, D., 3/11/2014, CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1217-1231 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Security implications of password discretization for click-based graphical passwords

    Zhu, B. B., Wei, D., Yang, M. & Yan, J., 05/2013, WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web. New York: ACM, p. 1581-1591 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Towards new security primitives based on hard AI problems

    Zhu, B. B. & Yan, J., 2013, Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Christianson, B., Malcolm, J., Stajano, F., Anderson, J. & Bonneau, J. (eds.). Berlin: Springer Verlag, p. 3-10 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8263).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Captcha as graphical passwords: a new security primitive based on hard AI problems

    Zhu, B. B., Yan, J., Bao, G., Yang, M. & Xu, N., 2014, In: IEEE Transactions on Information Forensics and Security. 9, 6, p. 891-904 14 p., 6775249.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Attacks and design of image recognition CAPTCHAs

    Zhu, B. B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M. & Cai, K., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 187-200 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    Shoulder surfing defence for recall-based graphical passwords

    Zakaria, N. H., Griffiths, D., Brostoff, S. & Yan, J., 2011, SOUPS 2011 - Proceedings of the 7th Symposium on Usable Privacy and Security. New York: ACM, 6

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Security design in human computation games

    Yu, S. Y. & Yan, J., 2014, Security Protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 142-153 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A statistical aimbot detection method for online FPS games

    Yu, S. Y., Hammerla, N., Yan, J. & Andras, P., 2012, Proceedings of the International Joint Conference on Neural Networks (IJCNN). IEEE, p. 1-8 8 p. 6252489

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Aimbot detection in online FPS games using a heuristic method based on distribution comparison matrix

    Yu, S. Y., Hammerla, N., Yan, J. & Andras, P., 2012, Neural Information Processing: 19th International Conference, ICONIP 2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part V. Huang, T., Zeng, Z., Li, C. & Leung, C. S. (eds.). Berlin: Springer Verlag, p. 654-661 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7667 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Detecting cheaters for multiplayer games: theory, design and implementation

    Yeung, S. F., Lui, J. C. S., Liu, J. & Yan, J., 2006, 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006. IEEE, p. 1178-1182 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. Published

    Security design in human computation games (transcript of discussion)

    Yan, J., 2014, Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 154-160 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Towards new security primitives based on hard ai problems (Transcript of discussion)

    Yan, J., 2013, Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Christianson, B., Malcolm, J., Stajano, F., Anderson, J. & Bonneau, J. (eds.). Berlin: Springer Verlag, p. 11-18 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8263 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Collusion detection in online bridge

    Yan, J., 2010, Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence and the Twenty-Second Innovative Applications of Artificial Intelligence Conference : 11-15 July 2010, Atlanta, Georgia, USA.. Menlo Park, Calif.: AAAI, p. 1510-1515 6 p. (Artificial Intelligence).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Bot, cyborg and automated turing test: (or "putting the humanoid in the protocol")

    Yan, J., 2009, Security protocols: 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin: Springer Verlag, p. 190-197 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5087 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Breaking visual CAPTCHAs with naive pattern recognition algorithms

    Yan, J. & El Ahmad, A. S., 12/2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). IEEE, p. 279-291 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  16. Published

    A systematic classification of cheating in online games

    Yan, J. & Randell, B., 2005, NetGames '05 Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games. New York: ACM, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    A low-cost attack on a Microsoft captcha

    Yan, J. & El Ahmad, A. S., 2008, Proceedings of the 15th ACM conference on Computer and communications security - CCS '08. New York: ACM, p. 543-554 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    CAPTCHA security: a case study

    Yan, J. & El Ahmad, A. S., 07/2009, In: IEEE Security and Privacy Magazine. 7, 4, p. 22-28 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Captcha robustness: a security engineering perspective

    Yan, J. & El Ahmad, A. S., 02/2011, In: Computer. 44, 2, p. 54-60 7 p., 5601666.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    An investigation of cheating in online games

    Yan, J. & Randell, B., 05/2009, In: IEEE Security and Privacy Magazine. 7, 3, p. 37-44 8 p., 5054908.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Magic Bullet: a dual-purpose computer game

    Yan, J. & Yu, S., 2009, HCOMP '09 Proceedings of the ACM SIGKDD Workshop on Human Computation. New York: ACM, p. 32-33 2 p. 1600161

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Streamlining attacks on CAPTCHAs with a computer game

    Yan, J. & Yu, S. Y., 2009, IJCAI--09, proceedings of the Tweny-First International Joint Conference on Artificial Intelligence: Pasadena, California, USA, 11-17 July 2009. Menlo Park, Calif.: AAAI, p. 2095-2100 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Usability of CAPTCHAs or usability issues in CAPTCHA design

    Yan, J. & El Ahmad, A. S., 2008, SOUPS 2008 - Proceedings of the 4th Symposium on Usable Privacy and Security. New York: ACM, p. 44-52 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Enhancing collaborative spam detection with bloom filters

    Yan, J. & Cho, P. L., 2006, Computer Security Applications Conference, 2006. ACSAC '06. 22nd Annual. IEEE, p. 414-428 15 p. 4041186

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    System security research at Newcastle

    Yan, J., 2011, Proceedings - 1st SysSec Workshop, SysSec 2011. IEEE, p. 94-95 2 p. 6092774

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Password memorability and security: empirical results

    Yan, J., Alan, B., Anderson, R. & Grant, A., 2004, In: IEEE Security and Privacy Magazine. 2, 5, p. 25-31 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Security issues in online games

    Yan, J. & Choi, H-J., 2002, In: Electronic Library. 20, 2, p. 125-133 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    A note on proactive password checking

    Yan, J., 2001, New Security Paradigms Workshop: proceedings : September 10th-13th, 2001, Cloudcroft, NM, USA . New York: ACM, p. 127-135 9 p. (Proceedings of the 2001 New Security Paradigms Workshop).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    A simple generic attack on text captchas

    Yan, J., 22/02/2016, NDSS Symposium 2016. 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    The science and detection of tilting

    Wei, X., Palomäki, J., Yan, J. & Robinson, P., 6/06/2016, ICMR '16 Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval. New York: ACM, p. 79-86 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Targeted online password guessing: an underestimated threat

    Wang, D., Zhang, Z., Wang, P., Yan, J. & Huang, X., 24/10/2016, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1242-1254 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Acceleration attacks on PBKDF2: or, what is inside the black-box of oclHashcat?

    Ruddick, A. & Yan, J., 8/08/2016. 14 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  33. Published

    Machiavelli as a poker mate: a naturalistic behavioural study on strategic deception

    Palomäki, J., Yan, J. & Laakasuo, M., 08/2016, In: Personality and Individual Differences. 98, p. 266-271 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    "To bluff like a man or fold like a girl?": gender biased deceptive behavior in online poker

    Palomäki, J., Yan, J., Modic, D. & Laakasuo, M., 6/07/2016, In: PLoS ONE. 11, 7, 13 p., e0157838.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Enhancing sensor pattern noise for source camera identification: an empirical evaluation

    Liu, B., Wei, X. & Yan, J., 06/2015, IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, p. 85-90 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Graphical passwords and qualitative spatial relations

    Lin, D., Dunphy, P., Olivier, P. & Yan, J., 2007, SOUPS '07 Proceedings of the 3rd symposium on Usable privacy and security. New York: ACM, p. 161-162 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    The robustness of hollow CAPTCHAs

    Gao, H., Wang, W., Qi, J., Wang, X., Liu, X. & Yan, J., 11/2013, CCS '13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York: ACM, p. 1075-1086 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    CAPTCHA design: color, usability, and security

    El Ahmad, A. S., Yan, J. & Ng, W. Y., 03/2012, In: IEEE Internet Computing. 16, 2, p. 44-51 8 p., 5959144.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    The Robustness of Google CAPTCHAs

    El Ahmad, A. S., Yan, J. & Tayara, M., 09/2011, Newcastle Upon Tyne: Newcastle University School of Computing Science. 15 p. (School of Computing Science Technical Report Series )

    Research output: Book/Report/ProceedingsOther report

  40. Published

    The robustness of a new CAPTCHA

    El, A. S., Yan, J. & Marshall, L., 2010, Proceedings of the 3rd European Workshop on System Security, EUROSEC'10. New York: ACM, p. 36-41 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Do background images improve "draw a secret" graphical passwords?

    Dunphy, P. & Yan, J., 2007, CCS '07 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07. New York: ACM, p. 36-47 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Is FacePIN secure and usable?

    Dunphy, P. & Yan, J., 2007, SOUPS '07 Proceedings of the 3rd Symposium on Usable Privacy and Security. New York: ACM, p. 165-166 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Towards Reactive Acoustic Jamming for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 15/10/2018, 2nd International Workshop on Multimedia Privacy and Security. ACM Press, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    SonarSnoop: active acoustic side-channel attacks

    Cheng, P., Bagci, I., Roedig, U. & Yan, J., 1/03/2020, In: International Journal of Information Security. 19, p. 213-228 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I., Yan, J. & Roedig, U., 20/05/2019. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  46. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 23/05/2019, SafeThings 2019 : IEEE Workshop on the Internet of Safe Things. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Failures of security APIs: a new case

    Algwil, A. & Yan, J., 23/02/2016, Financial Cryptography and Data Security: 2016 Proceedings. New York: Springer, 17 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    A security analysis of automated Chinese turing tests

    Algwil, A., Ciresan, D., Liu, B. & Yan, J., 5/12/2016, ACSAC '16 Proceedings of the 32nd Annual Conference on Computer Security Applications: ACSAC 32. New York: ACM, p. 520-532 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top