Home > Research > Researchers > Dr Jeff Yan > Publications

Dr Jeff Yan

Formerly at Lancaster University

  1. 2013
  2. Published

    The robustness of hollow CAPTCHAs

    Gao, H., Wang, W., Qi, J., Wang, X., Liu, X. & Yan, J., 11/2013, CCS '13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York: ACM, p. 1075-1086 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. 2014
  4. Published

    Captcha as graphical passwords: a new security primitive based on hard AI problems

    Zhu, B. B., Yan, J., Bao, G., Yang, M. & Xu, N., 2014, In: IEEE Transactions on Information Forensics and Security. 9, 6, p. 891-904 14 p., 6775249.

    Research output: Contribution to journalJournal articlepeer-review

  5. Published

    Security design in human computation games

    Yu, S. Y. & Yan, J., 2014, Security Protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 142-153 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Security design in human computation games (transcript of discussion)

    Yan, J., 2014, Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 154-160 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Security analyses of click-based graphical passwords via image point memorability

    Zhu, B. B., Yan, J., Yang, M. & Wei, D., 3/11/2014, CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1217-1231 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. 2015
  9. Published

    Enhancing sensor pattern noise for source camera identification: an empirical evaluation

    Liu, B., Wei, X. & Yan, J., 06/2015, IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, p. 85-90 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. 2016
  11. Published

    A simple generic attack on text captchas

    Yan, J., 22/02/2016, NDSS Symposium 2016. 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Failures of security APIs: a new case

    Algwil, A. & Yan, J., 23/02/2016, Financial Cryptography and Data Security: 2016 Proceedings. New York: Springer, 17 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    The science and detection of tilting

    Wei, X., Palomäki, J., Yan, J. & Robinson, P., 6/06/2016, ICMR '16 Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval. New York: ACM, p. 79-86 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    "To bluff like a man or fold like a girl?": gender biased deceptive behavior in online poker

    Palomäki, J., Yan, J., Modic, D. & Laakasuo, M., 6/07/2016, In: PLoS ONE. 11, 7, 13 p., e0157838.

    Research output: Contribution to journalJournal articlepeer-review

Back to top