Home > Research > Researchers > Dr Jeff Yan > Publications

Dr Jeff Yan

Formerly at Lancaster University

  1. Chapter
  2. Published

    Attacks and design of image recognition CAPTCHAs

    Zhu, B. B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M. & Cai, K., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 187-200 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    Breaking visual CAPTCHAs with naive pattern recognition algorithms

    Yan, J. & El Ahmad, A. S., 12/2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). IEEE, p. 279-291 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    Detecting cheaters for multiplayer games: theory, design and implementation

    Yeung, S. F., Lui, J. C. S., Liu, J. & Yan, J., 2006, 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006. IEEE, p. 1178-1182 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Conference contribution/Paper
  6. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 23/05/2019, SafeThings 2019 : IEEE Workshop on the Internet of Safe Things. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Towards Reactive Acoustic Jamming for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 15/10/2018, 2nd International Workshop on Multimedia Privacy and Security. ACM Press, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A security analysis of automated Chinese turing tests

    Algwil, A., Ciresan, D., Liu, B. & Yan, J., 5/12/2016, ACSAC '16 Proceedings of the 32nd Annual Conference on Computer Security Applications: ACSAC 32. New York: ACM, p. 520-532 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Targeted online password guessing: an underestimated threat

    Wang, D., Zhang, Z., Wang, P., Yan, J. & Huang, X., 24/10/2016, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1242-1254 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    The science and detection of tilting

    Wei, X., Palomäki, J., Yan, J. & Robinson, P., 6/06/2016, ICMR '16 Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval. New York: ACM, p. 79-86 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Failures of security APIs: a new case

    Algwil, A. & Yan, J., 23/02/2016, Financial Cryptography and Data Security: 2016 Proceedings. New York: Springer, 17 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A simple generic attack on text captchas

    Yan, J., 22/02/2016, NDSS Symposium 2016. 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 Next

Back to top