Home > Research > Researchers > Dr Jeff Yan > Publications

Dr Jeff Yan

Formerly at Lancaster University

  1. Chapter
  2. Published

    Attacks and design of image recognition CAPTCHAs

    Zhu, B. B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M. & Cai, K., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 187-200 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    Breaking visual CAPTCHAs with naive pattern recognition algorithms

    Yan, J. & El Ahmad, A. S., 12/2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). IEEE, p. 279-291 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    Detecting cheaters for multiplayer games: theory, design and implementation

    Yeung, S. F., Lui, J. C. S., Liu, J. & Yan, J., 2006, 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006. IEEE, p. 1178-1182 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Conference contribution/Paper
  6. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 23/05/2019, SafeThings 2019 : IEEE Workshop on the Internet of Safe Things. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Towards Reactive Acoustic Jamming for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 15/10/2018, 2nd International Workshop on Multimedia Privacy and Security. ACM Press, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A security analysis of automated Chinese turing tests

    Algwil, A., Ciresan, D., Liu, B. & Yan, J., 5/12/2016, ACSAC '16 Proceedings of the 32nd Annual Conference on Computer Security Applications: ACSAC 32. New York: ACM, p. 520-532 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Targeted online password guessing: an underestimated threat

    Wang, D., Zhang, Z., Wang, P., Yan, J. & Huang, X., 24/10/2016, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1242-1254 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    The science and detection of tilting

    Wei, X., Palomäki, J., Yan, J. & Robinson, P., 6/06/2016, ICMR '16 Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval. New York: ACM, p. 79-86 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Failures of security APIs: a new case

    Algwil, A. & Yan, J., 23/02/2016, Financial Cryptography and Data Security: 2016 Proceedings. New York: Springer, 17 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A simple generic attack on text captchas

    Yan, J., 22/02/2016, NDSS Symposium 2016. 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Enhancing sensor pattern noise for source camera identification: an empirical evaluation

    Liu, B., Wei, X. & Yan, J., 06/2015, IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, p. 85-90 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Security analyses of click-based graphical passwords via image point memorability

    Zhu, B. B., Yan, J., Yang, M. & Wei, D., 3/11/2014, CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1217-1231 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Security design in human computation games

    Yu, S. Y. & Yan, J., 2014, Security Protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 142-153 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Security design in human computation games (transcript of discussion)

    Yan, J., 2014, Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 154-160 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    The robustness of hollow CAPTCHAs

    Gao, H., Wang, W., Qi, J., Wang, X., Liu, X. & Yan, J., 11/2013, CCS '13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York: ACM, p. 1075-1086 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Security implications of password discretization for click-based graphical passwords

    Zhu, B. B., Wei, D., Yang, M. & Yan, J., 05/2013, WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web. New York: ACM, p. 1581-1591 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Towards new security primitives based on hard AI problems

    Zhu, B. B. & Yan, J., 2013, Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Christianson, B., Malcolm, J., Stajano, F., Anderson, J. & Bonneau, J. (eds.). Berlin: Springer Verlag, p. 3-10 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8263).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Towards new security primitives based on hard ai problems (Transcript of discussion)

    Yan, J., 2013, Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Christianson, B., Malcolm, J., Stajano, F., Anderson, J. & Bonneau, J. (eds.). Berlin: Springer Verlag, p. 11-18 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8263 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    A statistical aimbot detection method for online FPS games

    Yu, S. Y., Hammerla, N., Yan, J. & Andras, P., 2012, Proceedings of the International Joint Conference on Neural Networks (IJCNN). IEEE, p. 1-8 8 p. 6252489

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Aimbot detection in online FPS games using a heuristic method based on distribution comparison matrix

    Yu, S. Y., Hammerla, N., Yan, J. & Andras, P., 2012, Neural Information Processing: 19th International Conference, ICONIP 2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part V. Huang, T., Zeng, Z., Li, C. & Leung, C. S. (eds.). Berlin: Springer Verlag, p. 654-661 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7667 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Shoulder surfing defence for recall-based graphical passwords

    Zakaria, N. H., Griffiths, D., Brostoff, S. & Yan, J., 2011, SOUPS 2011 - Proceedings of the 7th Symposium on Usable Privacy and Security. New York: ACM, 6

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    System security research at Newcastle

    Yan, J., 2011, Proceedings - 1st SysSec Workshop, SysSec 2011. IEEE, p. 94-95 2 p. 6092774

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Collusion detection in online bridge

    Yan, J., 2010, Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence and the Twenty-Second Innovative Applications of Artificial Intelligence Conference : 11-15 July 2010, Atlanta, Georgia, USA.. Menlo Park, Calif.: AAAI, p. 1510-1515 6 p. (Artificial Intelligence).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    The robustness of a new CAPTCHA

    El, A. S., Yan, J. & Marshall, L., 2010, Proceedings of the 3rd European Workshop on System Security, EUROSEC'10. New York: ACM, p. 36-41 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Bot, cyborg and automated turing test: (or "putting the humanoid in the protocol")

    Yan, J., 2009, Security protocols: 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin: Springer Verlag, p. 190-197 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5087 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Magic Bullet: a dual-purpose computer game

    Yan, J. & Yu, S., 2009, HCOMP '09 Proceedings of the ACM SIGKDD Workshop on Human Computation. New York: ACM, p. 32-33 2 p. 1600161

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Streamlining attacks on CAPTCHAs with a computer game

    Yan, J. & Yu, S. Y., 2009, IJCAI--09, proceedings of the Tweny-First International Joint Conference on Artificial Intelligence: Pasadena, California, USA, 11-17 July 2009. Menlo Park, Calif.: AAAI, p. 2095-2100 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    A low-cost attack on a Microsoft captcha

    Yan, J. & El Ahmad, A. S., 2008, Proceedings of the 15th ACM conference on Computer and communications security - CCS '08. New York: ACM, p. 543-554 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Usability of CAPTCHAs or usability issues in CAPTCHA design

    Yan, J. & El Ahmad, A. S., 2008, SOUPS 2008 - Proceedings of the 4th Symposium on Usable Privacy and Security. New York: ACM, p. 44-52 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Do background images improve "draw a secret" graphical passwords?

    Dunphy, P. & Yan, J., 2007, CCS '07 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07. New York: ACM, p. 36-47 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Is FacePIN secure and usable?

    Dunphy, P. & Yan, J., 2007, SOUPS '07 Proceedings of the 3rd Symposium on Usable Privacy and Security. New York: ACM, p. 165-166 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Graphical passwords and qualitative spatial relations

    Lin, D., Dunphy, P., Olivier, P. & Yan, J., 2007, SOUPS '07 Proceedings of the 3rd symposium on Usable privacy and security. New York: ACM, p. 161-162 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Enhancing collaborative spam detection with bloom filters

    Yan, J. & Cho, P. L., 2006, Computer Security Applications Conference, 2006. ACSAC '06. 22nd Annual. IEEE, p. 414-428 15 p. 4041186

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    A systematic classification of cheating in online games

    Yan, J. & Randell, B., 2005, NetGames '05 Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games. New York: ACM, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    A note on proactive password checking

    Yan, J., 2001, New Security Paradigms Workshop: proceedings : September 10th-13th, 2001, Cloudcroft, NM, USA . New York: ACM, p. 127-135 9 p. (Proceedings of the 2001 New Security Paradigms Workshop).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Conference paper
  39. Published

    Acceleration attacks on PBKDF2: or, what is inside the black-box of oclHashcat?

    Ruddick, A. & Yan, J., 8/08/2016. 14 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  40. Poster
  41. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I., Yan, J. & Roedig, U., 20/05/2019. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  42. Journal article
  43. Published

    SonarSnoop: active acoustic side-channel attacks

    Cheng, P., Bagci, I., Roedig, U. & Yan, J., 1/03/2020, In: International Journal of Information Security. 19, p. 213-228 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    Machiavelli as a poker mate: a naturalistic behavioural study on strategic deception

    Palomäki, J., Yan, J. & Laakasuo, M., 08/2016, In: Personality and Individual Differences. 98, p. 266-271 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    "To bluff like a man or fold like a girl?": gender biased deceptive behavior in online poker

    Palomäki, J., Yan, J., Modic, D. & Laakasuo, M., 6/07/2016, In: PLoS ONE. 11, 7, 13 p., e0157838.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    Captcha as graphical passwords: a new security primitive based on hard AI problems

    Zhu, B. B., Yan, J., Bao, G., Yang, M. & Xu, N., 2014, In: IEEE Transactions on Information Forensics and Security. 9, 6, p. 891-904 14 p., 6775249.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    CAPTCHA design: color, usability, and security

    El Ahmad, A. S., Yan, J. & Ng, W. Y., 03/2012, In: IEEE Internet Computing. 16, 2, p. 44-51 8 p., 5959144.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Captcha robustness: a security engineering perspective

    Yan, J. & El Ahmad, A. S., 02/2011, In: Computer. 44, 2, p. 54-60 7 p., 5601666.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    CAPTCHA security: a case study

    Yan, J. & El Ahmad, A. S., 07/2009, In: IEEE Security and Privacy Magazine. 7, 4, p. 22-28 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    An investigation of cheating in online games

    Yan, J. & Randell, B., 05/2009, In: IEEE Security and Privacy Magazine. 7, 3, p. 37-44 8 p., 5054908.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    Password memorability and security: empirical results

    Yan, J., Alan, B., Anderson, R. & Grant, A., 2004, In: IEEE Security and Privacy Magazine. 2, 5, p. 25-31 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    Security issues in online games

    Yan, J. & Choi, H-J., 2002, In: Electronic Library. 20, 2, p. 125-133 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. Other report
  54. Published

    The Robustness of Google CAPTCHAs

    El Ahmad, A. S., Yan, J. & Tayara, M., 09/2011, Newcastle Upon Tyne: Newcastle University School of Computing Science. 15 p. (School of Computing Science Technical Report Series )

    Research output: Book/Report/ProceedingsOther report

Back to top