Qiben Yan

ORCID: 0000-0003-0551-2163
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • User Authentication and Security Systems
  • Network Security and Intrusion Detection
  • Security and Verification in Computing
  • Software Testing and Debugging Techniques
  • Speech and Audio Processing
  • Indoor and Outdoor Localization Technologies
  • Security in Wireless Sensor Networks
  • Caching and Content Delivery
  • Cryptography and Data Security
  • Complex Network Analysis Techniques
  • Digital and Cyber Forensics
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • FinTech, Crowdfunding, Digital Finance
  • Advanced Graph Neural Networks
  • Topic Modeling
  • Spam and Phishing Detection
  • Distributed systems and fault tolerance
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Explainable Artificial Intelligence (XAI)
  • Emotion and Mood Recognition
  • Digital Media Forensic Detection
  • Access Control and Trust

Michigan State University
2020-2024

Michigan United
2021

With recent advances in artificial intelligence and natural language processing, voice has become a primary method for human-computer interaction.It enabled game-changing new technologies both commercial sectors military sectors, such as Siri, Alexa, Google Assistant, voice-controlled naval warships.Recently, researchers have demonstrated that these assistant systems are susceptible to signal injection at the inaudible frequencies.To date, most of existing works focus primarily on delivering...

10.14722/ndss.2020.24068 article EN 2020-01-01

Ethereum is a permissionless blockchain ecosystem that supports execution of smart contracts, the key enablers decentralized finance (DeFi) and non-fungible tokens (NFT). However, expressiveness contracts double-edged sword: while it enables programmability, also introduces security vulnerabilities, i.e., exploitable discrepancies between expected actual behaviors contract code. To address these increase vulnerability coverage, we propose new testing approach called transaction...

10.1109/tifs.2023.3234895 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

With the emergence of low-cost smart and connected IoT devices, area cyber-physical security is becoming increasingly important. Past research has demonstrated new threat vectors targeting transition process between cyber physical domains, where attacker exploits sensing system as an attack surface for signal injection or extraction private information. Recently, there have been attempts to characterize abstracted model injection, but they primarily focus on path processing. This paper aims...

10.1109/comst.2021.3081450 article EN publisher-specific-oa IEEE Communications Surveys & Tutorials 2021-01-01

Inaudible voice command injection is one of the most threatening attacks towards assistants. Existing aim at injecting attack signals over air, but they require access to authorized user's for activating Moreover, effectiveness can be greatly deteriorated in a noisy environment. In this paper, we explore new type channel, power line side-channel, launch inaudible injection. By audio through modified charging cable, becomes more resilient against various environmental factors and liveness...

10.14722/ndss.2022.24254 preprint EN 2022-01-01

Malware detection and classification are crucial for protecting digital devices information systems. Accurate identification of malware enables researchers incident responders to take prompt measures against mitigate its damage. With the development attention mechanisms in field computer vision, mechanism-based techniques also rapidly evolving. The essence mechanism is focus on interest suppress useless information. In this paper, we develop different plug-and-play based ResNeXt tagging...

10.1109/tifs.2023.3328431 article EN IEEE Transactions on Information Forensics and Security 2023-10-30

As many real-world networks evolve over time, such as social networks, user-item and IP-IP anomaly detection for dynamic graphs has attracted growing attention. Most existing studies focus on detecting anomalous nodes or edges but fail to detect motif instances. In this paper, we propose MADG, a general Motif-level Anomaly Detection framework Graphs, which can identify the in different motifs. Motifs are specific subgraph structures that frequently occur network have been widely used...

10.1109/tifs.2023.3272731 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

With the explosive increase in wireless devices, physical-layer signal analysis has become critically beneficial across distinctive domains including interference minimization network planning, security and privacy (e.g., drone spycam detection), mobile health with remote sensing. While SDR is known to be highly effective realizing such services, they are rarely deployed or used by end-users due costly hardware ~1K USD USRP). Low-cost SDRs RTL-SDR) available, but their bandwidth limited 2-3...

10.1145/3372224.3419189 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2020-09-18

Due to the growing presence of Internet Things (IoT) apps and devices in smart homes cities, there are more concerns about their security privacy risks. IoT normally interact with each other physical world offer utility users. In this paper, we investigate safety risks brought by interactive behaviors apps. Two major challenges ensue identifying interaction threats: i) how discover threats across both cyber channels; ii) ensure scalability detection approach. To address these challenges,...

10.1109/tse.2022.3179294 article EN IEEE Transactions on Software Engineering 2022-05-31

With the rapid development of automation tools including polymorphic and metamorphic engines, generic packers, genetic programming, many variants malware have emerged, which pose a significant threat to Internet security. To effectively detect variants, researchers developed visualization-based approaches that can visualize adaptations for in-depth analysis. However, most existing visualization rely on binary image sample, fail provide an effective texture feature representation thus often...

10.1109/tifs.2021.3124725 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2021-01-01

Hardware wallets are designed to withstand malware attacks by isolating their private keys from the cyberspace, but they vulnerable that fake an address stored in a clipboard. To prevent such attacks, hardware wallet asks user verify recipient shown on display. Since crypto addresses long sequences of random symbols, manual verification becomes difficult task. Consequently, many users elect only few symbols address, and this can be exploited attacker. In work, we introduce EthClipper, attack...

10.1109/cns53000.2021.9705033 preprint EN 2021-10-04

Public blockchains have spurred the growing popularity of decentralized transactions and smart contracts, especially on financial market. However, public exhibit their limitations transaction throughput, storage availability, compute capacity. To avoid gridlock, impose large fees per-block resource limits, making it difficult to accommodate ever-growing high demand. Previous research endeavors improve scalability performance blockchain through various technologies, such as side-chaining,...

10.1109/icdcs51616.2021.00064 article EN 2021-07-01

Being able to automatically detect the performance issues in apps can significantly improve apps' quality as well having a positive influence on user satisfaction. <underline xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">A</u> pplication xmlns:xlink="http://www.w3.org/1999/xlink">P</u> erformance xmlns:xlink="http://www.w3.org/1999/xlink">M</u> anagement (APM) libraries are used locate bottleneck, monitor their behaviors at runtime, and identify...

10.1109/tse.2021.3077654 article EN IEEE Transactions on Software Engineering 2021-05-05

Current data-driven intelligent transportation systems are mainly reliant on IEEE 802.11p to collect and exchange information. Despite promising performance of in providing low-latency communications, it is still vulnerable jamming attacks due the lack a PHY-layer countermeasure technique practice. In this paper, we propose JammingBird, novel receiver design that tolerates strong constant attacks. The enablers JammingBird two MIMO-based techniques: Jamming-resistant synchronizer suppressor....

10.1109/secon52354.2021.9491603 article EN 2021-07-06

The rising popularity of the Internet-of-Things (IoT) devices has driven their increasing adoption in various settings, such as modern homes. IoT systems integrate physical with third-party apps, which can coordinate arbitrary ways. However, malicious or undesired coordination lead to serious vulnerabilities. This paper explores two different ways, i.e., a commonly-used state-based approach and holistic, rule-based approach, formally model app safety security thereof context platforms. less...

10.1145/3416507.3423188 article EN 2020-11-06

In cellular networks, multiuser multiple-input multiple-output (MU-MIMO) is a key technology and has already been deployed in many real systems. Recently, device-to-device (D2D) communication emerged as another promising it offers several advantages, such traffic offloading, low-latency transmissions, enhanced spectral efficiency. Although there are results of these two technologies, most them limited to their respective domains lack practical design combine both technologies for networks....

10.1109/jiot.2021.3066502 article EN publisher-specific-oa IEEE Internet of Things Journal 2021-03-17

Autonomous vehicles (AVs), equipped with numerous sensors such as camera, LiDAR, radar, and ultrasonic sensor, are revolutionizing the transportation industry. These expected to sense reliable information from a physical environment, facilitating critical decision-making process of AVs. Ultrasonic sensors, which detect obstacles in short distance, play an important role assisted parking blind spot detection events. However, due their weak security level, particularly vulnerable signal...

10.1109/secon52354.2021.9491590 article EN 2021-07-06

Expression recognition holds great promise for applications such as content recommendation and mental healthcare by accurately detecting users' emotional states. Traditional methods often rely on cameras or wearable sensors, which raise privacy concerns add extra device burdens. In addition, existing acoustic-based struggle to maintain satisfactory performance when there is a distribution shift between the training dataset inference dataset. this paper, we introduce FacER+, an active...

10.48550/arxiv.2410.12811 preprint EN arXiv (Cornell University) 2024-09-30

Large Language Models (LLMs) have demonstrated great capabilities in natural language understanding and generation, largely attributed to the intricate alignment process using human feedback. While has become an essential training component that leverages data collected from user queries, it inadvertently opens up avenue for a new type of user-guided poisoning attacks. In this paper, we present novel exploration into latent vulnerabilities pipeline recent LLMs, revealing subtle yet effective...

10.48550/arxiv.2409.00787 preprint EN arXiv (Cornell University) 2024-09-01
Coming Soon ...