Publications

2018

  • Social bots for online public health interventions
    A. Deb, A. Majmundar, S. Seo, A. Matsui, R. Tandon, S. Yan, J. Allem, and E. Ferrara
    2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM'18)
  • Abstract: According to the Center for Disease Control and Prevention, in the United States hundreds of thousands initiate smoking each year, and millions live with smoking-related dis- eases. Many tobacco users discuss their habits and preferences on social media. This work conceptualizes a framework for targeted health interventions to inform...

  • SoundAuth: Secure zero-effort two-factor authentication based on audio signals
    M. Wang, W.-T. Zhu, S. Yan, and Q. Wang
    6th IEEE Conference on Communications and Network Security (CNS'18)
  • Abstract: Two-factor authentication (2FA) popularly works by verifying something the user knows (a password) and something she possesses (a token, popularly instantiated with a smart phone). Conventional 2FA systems require extra interaction like typing a verification code, which is not very user-friendly. For improved user experience, recent work aims at...

2016

  • DynaEgo: Privacy-preserving collaborative filtering recommender system based on social-aware differential privacy
    S. Yan, S. Pan, W.-T. Zhu, and K. Chen
    18th International Conference on Information and Communication Security (ICICS'16)
  • Abstract: Collaborative filtering plays an important role in online recommender systems, which provide personalized services to consumers by collecting and analyzing their rating histories. At the same time, such personalization may unfavorably incur privacy leakage, which has motivated the development of privacy-preserving collaborative filtering (PPCF) mechanisms. Most previous research efforts...

  • A secure and fast dispersal storage scheme based on the learning with errors problem
    L. Yang, F. Fang, X. Lu, W. T. Zhu, Q. Wang, S. Yan, and S. Pan
    12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm'16)
  • Abstract: Data confidentiality and availability are of primary concern in data storage. Dispersal storage schemes achieve these two security properties by transforming the data into multiple codewords and dispersing them across multiple storage servers. Existing schemes achieve confidentiality and availability by various cryptographic and coding algorithms, but only under the...

  • Towards Privacy-preserving data mining in online social networks: Distance-grained and item-grained differential privacy
    S. Yan, S. Pan, Y. Zhao, and W.-T. Zhu
    21st Australasian Conference on Information Security and Privacy (ACISP'16)
  • Abstract: Online social networks have becoming increasingly popular, where users are more and more lured to reveal their private information. This brings about convenient personalized services but also incurs privacy concerns. To balance utility and privacy, many privacy preserving mechanisms such as differential privacy have been proposed. However, most existent...

  • Security analysis on privacy-preserving cloud aided biometric identificaiton schemes
    S. Pan, S. Yan, and W.-T. Zhu
    21st Australasian Conference on Information Security and Privacy (ACISP'16)
  • Abstract: Biometric identification is to reliably and effectively identify an individual of interest, where a pre-established database of biometric records is scanned with the unknown individual's biometric sample to look for a close enough match. This has recently been aided with cloud computing, where the database owner achieves higher efficiency...

2014

  • Guaranteed time slots allocation in multi-node wireless sensor networks
    S.R. Fan, S. Yan, and M. Gao
    Chinese Journal of Sensors and Actuators
  • Abstract: With the unique characteristics of low power consumption and low cost, IEEE 802.15.2 standard is widely used in the modern wireless networks. It can provide the lowest 0.006% of duty ratio to reduce power consumption, and offer real-time service for the node through the guarantee time slots (GTS) mechanism....