Items where Author is "Yan, Jeff"

Group by: Item Type | No Grouping
Number of items: 49.

Cheng, Peng and Bagci, Ibrahim and Roedig, Utz and Yan, Jeff (2020) SonarSnoop : active acoustic side-channel attacks. International Journal of Information Security, 19. pp. 213-228. ISSN 1615-5262

Cheng, Peng and Bagci, Ibrahim Ethem and Yan, Jeff and Roedig, Utz (2019) Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants. In: SafeThings 2019 : IEEE Workshop on the Internet of Safe Things. IEEE.

Cheng, Peng and Bagci, Ibrahim and Yan, Jeff and Roedig, Utz (2019) Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants. In: 40th IEEE Symposium on Security and Privacy, 2019-05-20 - 2019-05-22, Hyatt Regency.

Cheng, Peng and Bagci, Ibrahim Ethem and Yan, Jeff and Roedig, Utz (2018) Towards Reactive Acoustic Jamming for Personal Voice Assistants. In: 2nd International Workshop on Multimedia Privacy and Security :. ACM Press, CAN.

Algwil, Abdalnaser and Yan, Jeff (2018) Security and usability of cross-device captchas. PhD thesis, Lancaster University.

Algwil, Abdalnaser and Ciresan, Dan and Liu, Beibei and Yan, Jeff (2016) A security analysis of automated Chinese turing tests. In: ACSAC '16 Proceedings of the 32nd Annual Conference on Computer Security Applications : ACSAC 32. ACM, New York, pp. 520-532. ISBN 9781450347716

Wang, Ding and Zhang, Zijian and Wang, Ping and Yan, Jeff and Huang, Xinyi (2016) Targeted online password guessing : an underestimated threat. In: CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security :. ACM, New York, pp. 1242-1254. ISBN 9781450341394

Ruddick, Andrew and Yan, Jeff (2016) Acceleration attacks on PBKDF2 : or, what is inside the black-box of oclHashcat? In: 10th USENIX Workshop on Offensive Technologies, 2016-08-08 - 2016-08-09.

Palomäki, Jussi and Yan, Jeff and Laakasuo, Michael (2016) Machiavelli as a poker mate : a naturalistic behavioural study on strategic deception. Personality and Individual Differences, 98. pp. 266-271. ISSN 0191-8869

Palomäki, Jussi and Yan, Jeff and Modic, David and Laakasuo, Michael (2016) "To bluff like a man or fold like a girl?" : gender biased deceptive behavior in online poker. PLoS ONE, 11 (7): e0157838. ISSN 1932-6203

Wei, Xingjie and Palomäki, Jussi and Yan, Jeff and Robinson, Peter (2016) The science and detection of tilting. In: ICMR '16 Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval :. ACM, New York, pp. 79-86. ISBN 9781450343596

Algwil, Abdalnaser and Yan, Jeff (2016) Failures of security APIs : a new case. In: Financial Cryptography and Data Security : 2016 Proceedings. Lecture Notes in Computer Science . Springer, BRB.

Yan, Jeff (2016) A simple generic attack on text captchas. In: NDSS Symposium 2016 :. UNSPECIFIED, USA.

Liu, Bei-bei and Wei, Xingjie and Yan, Jeff (2015) Enhancing sensor pattern noise for source camera identification : an empirical evaluation. In: IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security :. ACM, New York, pp. 85-90. ISBN 97814503345874

Zhu, Bin B. and Yan, Jeff and Yang, Maowei and Wei, Dongchen (2014) Security analyses of click-based graphical passwords via image point memorability. In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security :. ACM, USA, pp. 1217-1231. ISBN 9781450329576

Zhu, Bin B. and Yan, Jeff and Bao, Guanbo and Yang, Maowei and Xu, Ning (2014) Captcha as graphical passwords : a new security primitive based on hard AI problems. IEEE Transactions on Information Forensics and Security, 9 (6): 6775249. pp. 891-904. ISSN 1556-6013

Yu, Su Yang and Yan, Jeff (2014) Security design in human computation games. In: Security Protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . Springer Verlag, GBR, pp. 142-153. ISBN 9783662459201

Yan, Jeff (2014) Security design in human computation games (transcript of discussion). In: Security Protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . Springer Verlag, GBR, pp. 154-160. ISBN 9783662459201

Gao, Haichang and Wang, Wei and Qi, Jiao and Wang, Xuqin and Liu, Xiyang and Yan, Jeff (2013) The robustness of hollow CAPTCHAs. In: CCS '13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security :. ACM, DEU, pp. 1075-1086. ISBN 9781450324779

Zhu, Bin B. and Wei, Dongchen and Yang, Maowei and Yan, Jeff (2013) Security implications of password discretization for click-based graphical passwords. In: WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web :. ACM, BRA, pp. 1581-1591. ISBN 9781450320351

Zhu, Bin B. and Yan, Jeff (2013) Towards new security primitives based on hard AI problems. In: Security Protocols XXI : 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . Springer Verlag, GBR, pp. 3-10. ISBN 9783642417160

Yan, Jeff (2013) Towards new security primitives based on hard ai problems (Transcript of discussion). In: Security Protocols XXI : 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . Springer Verlag, GBR, pp. 11-18. ISBN 9783642417160

El Ahmad, Ahmad Salah and Yan, Jeff and Ng, Wai Yin (2012) CAPTCHA design : color, usability, and security. IEEE Internet Computing, 16 (2): 5959144. pp. 44-51. ISSN 1089-7801

Yu, Su Yang and Hammerla, Nils and Yan, Jeff and Andras, Peter (2012) Aimbot detection in online FPS games using a heuristic method based on distribution comparison matrix. In: Neural Information Processing : 19th International Conference, ICONIP 2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part V. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . Springer Verlag, QAT, pp. 654-661. ISBN 9783642344992

Yu, Su Yang and Hammerla, Nils and Yan, Jeff and Andras, Peter (2012) A statistical aimbot detection method for online FPS games. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN) :. IEEE, AUS, pp. 1-8. ISBN 9781467314909

El Ahmad, A.S. and Yan, Jeff and Tayara, Mohamad (2011) The Robustness of Google CAPTCHAs. School of Computing Science Technical Report Series . Newcastle University School of Computing Science, Newcastle Upon Tyne.

Yan, Jeff and El Ahmad, Ahmad Salah (2011) Captcha robustness : a security engineering perspective. Computer, 44 (2): 5601666. pp. 54-60. ISSN 0018-9162

Zakaria, Nur Haryani and Griffiths, David and Brostoff, Sacha and Yan, Jeff (2011) Shoulder surfing defence for recall-based graphical passwords. In: SOUPS 2011 - Proceedings of the 7th Symposium on Usable Privacy and Security :. ACM, USA. ISBN 9781450309110

Yan, Jeff (2011) System security research at Newcastle. In: Proceedings - 1st SysSec Workshop, SysSec 2011 :. IEEE, NLD, pp. 94-95. ISBN 9780769545301

Zhu, Bin B. and Yan, Jeff and Li, Qiujie and Yang, Chao and Liu, Jia and Xu, Ning and Yi, Meng and Cai, Kaiwei (2010) Attacks and design of image recognition CAPTCHAs. In: CCS '10 Proceedings of the 17th ACM conference on Computer and communications security :. ACM, New York, pp. 187-200. ISBN 9781450302449

Yan, Jeff (2010) Collusion detection in online bridge. In: Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence and the Twenty-Second Innovative Applications of Artificial Intelligence Conference : 11-15 July 2010, Atlanta, Georgia, USA. Artificial Intelligence . AAAI, Menlo Park, Calif., pp. 1510-1515. ISBN 9781577354666

El, Ahmad Salah and Yan, Jeff and Marshall, Lindsay (2010) The robustness of a new CAPTCHA. In: Proceedings of the 3rd European Workshop on System Security, EUROSEC'10 :. ACM, FRA, pp. 36-41. ISBN 9781450300599

Yan, Jeff and El Ahmad, Ahmad Salah (2009) CAPTCHA security : a case study. IEEE Security and Privacy Magazine, 7 (4). pp. 22-28. ISSN 1540-7993

Yan, Jeff and Randell, Brian (2009) An investigation of cheating in online games. IEEE Security and Privacy Magazine, 7 (3): 5054908. pp. 37-44. ISSN 1540-7993

Yan, Jeff (2009) Bot, cyborg and automated turing test : (or "putting the humanoid in the protocol"). In: Security protocols : 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . Springer Verlag, Berlin, pp. 190-197. ISBN 9783642049033

Yan, Jeff and Yu, Su-yang (2009) Magic Bullet : a dual-purpose computer game. In: HCOMP '09 Proceedings of the ACM SIGKDD Workshop on Human Computation :. ACM, FRA, pp. 32-33. ISBN 9781605586724

Yan, Jeff and Yu, Su Yang (2009) Streamlining attacks on CAPTCHAs with a computer game. In: IJCAI--09, proceedings of the Tweny-First International Joint Conference on Artificial Intelligence : Pasadena, California, USA, 11-17 July 2009. AAAI, USA, pp. 2095-2100. ISBN 9781577354260

Yan, Jeff and El Ahmad, Ahmad Salah (2008) Usability of CAPTCHAs or usability issues in CAPTCHA design. In: SOUPS 2008 - Proceedings of the 4th Symposium on Usable Privacy and Security :. ACM, USA, pp. 44-52. ISBN 9781605582764

Yan, Jeff and El Ahmad, Ahmad Salah (2008) A low-cost attack on a Microsoft captcha. In: Proceedings of the 15th ACM conference on Computer and communications security - CCS '08 :. ACM, New York, pp. 543-554. ISBN 9781595938107

Yan, Jeff and El Ahmad, A. S. (2007) Breaking visual CAPTCHAs with naive pattern recognition algorithms. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) :. IEEE, pp. 279-291. ISBN 0769530605

Dunphy, Paul and Yan, Jeff (2007) Do background images improve "draw a secret" graphical passwords? In: CCS '07 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07 :. ACM, New York, pp. 36-47. ISBN 9781595937032

Lin, Di and Dunphy, Paul and Olivier, Patrick and Yan, Jeff (2007) Graphical passwords and qualitative spatial relations. In: SOUPS '07 Proceedings of the 3rd symposium on Usable privacy and security :. ACM, New York, pp. 161-162. ISBN 9781595938015

Dunphy, Paul and Yan, Jeff (2007) Is FacePIN secure and usable? In: SOUPS '07 Proceedings of the 3rd Symposium on Usable Privacy and Security :. ACM, New York, pp. 165-166. ISBN 9781595938015

Yeung, S. F. and Lui, John C. S. and Liu, Jiangchuan and Yan, Jeff (2006) Detecting cheaters for multiplayer games : theory, design and implementation. In: 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006 :. IEEE, pp. 1178-1182. ISBN 1424400856

Yan, Jeff and Cho, Pook Leong (2006) Enhancing collaborative spam detection with bloom filters. In: Computer Security Applications Conference, 2006. ACSAC '06. 22nd Annual :. IEEE, USA, pp. 414-428. ISBN 0769527167

Yan, Jeff and Randell, Brian (2005) A systematic classification of cheating in online games. In: NetGames '05 Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games :. ACM, New York, pp. 1-9. ISBN 1595931562

Yan, Jeff and Alan, Blackwell and Anderson, Ross and Grant, Alasdair (2004) Password memorability and security : empirical results. IEEE Security and Privacy Magazine, 2 (5). pp. 25-31. ISSN 1540-7993

Yan, Jeff and Choi, Hyun-Jin (2002) Security issues in online games. Electronic Library, 20 (2). pp. 125-133. ISSN 0264-0473

Yan, Jeff (2001) A note on proactive password checking. In: New Security Paradigms Workshop : proceedings : September 10th-13th, 2001, Cloudcroft, NM, USA. Proceedings of the 2001 New Security Paradigms Workshop . ACM, New York, pp. 127-135. ISBN 1581134576

This list was generated on Thu Apr 24 09:52:00 2025 UTC.