Wenfan Song

ORCID: 0000-0003-1769-8540
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • Biometric Identification and Security
  • Advanced Malware Detection Techniques
  • IoT and GPS-based Vehicle Safety Systems
  • Bluetooth and Wireless Communication Technologies
  • Parallel Computing and Optimization Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Antenna Design and Analysis
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Face recognition and analysis
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Cryptographic Implementations and Security
  • Gait Recognition and Analysis

Zhejiang University
2022-2024

Zhejiang University of Science and Technology
2021-2022

Face authentication (FA) schemes are universally adopted. However, current FA systems mainly camera-based and hence susceptible to face occlusion (e.g., facial masks) vulnerable spoofing attacks 3D-printed masks). This paper exploits the penetrability, material sensitivity, fine-grained sensing capability of millimeter wave (mmWave) build an anti-spoofing system, named mmFace. It scans human by moving a commodity off-the-shelf (COTS) mmWave radar along specific trajectory. The signals...

10.1145/3495243.3560515 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2022-10-14

Biometric plays an important role in user authentication. However, the most widely used biometrics, such as facial feature and fingerprint, are easy to capture or record, thus vulnerable spoofing attacks. On contrary, intracorporal electrocardiography electroencephalography, hard collect, hence more secure for Unfortunately, adopting them is not user-friendly due their complicated collection methods inconvenient constraints on users. In this paper, we propose a novel biometric-based...

10.1109/tmc.2022.3193847 article EN IEEE Transactions on Mobile Computing 2022-01-01

Biometric plays an important role in user authentication. However, the most widely used biometrics, such as facial feature and fingerprint, are easy to capture or record, thus vulnerable spoofing attacks. On contrary, intracorporal electrocardiography electroencephalography, hard collect, hence more secure for Unfortunately, adopting them is not user-friendly due their complicated collection methods inconvenient constraints on users. In this paper, we propose a novel biometric-based...

10.1109/icdcs51616.2021.00070 article EN 2021-07-01

Mouse is a ubiquitous input tool crucial for user-computer interaction in modern society. However, the inherent trust mouse may pose security risks. If maliciously manipulated, connected computer could be secretly controlled, endangering personal privacy and property. In this paper, we introduce PuppetMouse, first intentional electromagnetic interference (IEMI) injection-based attack that can effectively manipulate clicks movements without physical contact. By adjusting parameters of IEMI...

10.1145/3678570 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2024-08-22
Coming Soon ...