Qing Yang
TitleCited byYear
HMOG: New behavioral biometric features for continuous authentication of smartphone users
Z Sitová, J Šeděnka, Q Yang, G Peng, G Zhou, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 11 (5), 877-892, 2015
1442015
Continuous authentication with touch behavioral biometrics and voice on wearable glasses
G Peng, G Zhou, DT Nguyen, X Qi, Q Yang, S Wang
IEEE Transactions on Human-Machine Systems 47 (3), 404-416, 2016
292016
On inferring browsing activity on smartphones via USB power analysis side-channel
Q Yang, P Gasti, G Zhou, A Farajidavar, KS Balagani
IEEE Transactions on Information Forensics and Security 12 (5), 1056-1066, 2016
182016
A multimodal data set for evaluating continuous authentication performance in smartphones
Q Yang, G Peng, DT Nguyen, X Qi, G Zhou, Z Sitová, P Gasti, KS Balagani
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014
132014
Secure, fast, and energy-efficient outsourced authentication for smartphones
P Gasti, J Šeděnka, Q Yang, G Zhou, KS Balagani
IEEE Transactions on Information Forensics and Security 11 (11), 2556-2571, 2016
122016
LBVC: towards low-bandwidth video chat on smartphones
X Qi, Q Yang, DT Nguyen, G Zhou, G Peng
Proceedings of the 6th ACM Multimedia Systems Conference, 1-12, 2015
102015
A context-aware framework for reducing bandwidth usage of mobile video chats
X Qi, Q Yang, DT Nguyen, G Peng, G Zhou, B Dai, D Zhang, Y Li
IEEE Transactions on Multimedia 18 (8), 1640-1649, 2016
62016
Context-aware frame rate adaption for video chat on smartphones
X Qi, Q Yang, DT Nguyen, G Zhou
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing …, 2013
62013
Hierarchical clustering analysis from genomic dataset
W Yin, Q Yang, S Yao
IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 759-762, 2005
22005
MEG: Memory and energy efficient garbled circuit evaluation on smartphones
Q Yang, G Peng, P Gasti, KS Balagani, Y Li, G Zhou
IEEE Transactions on Information Forensics and Security 14 (4), 913-922, 2018
12018
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data....................
G Xu, H Li, Y Dai, K Yang, X Lin, Q Yang, G Peng, P Gasti, KS Balagani, ...
IEEE Transactions on Information Forensics and Security, DOI 10, 0
1
USB side-channel attack on Tor
Q Yang, P Gasti, K Balagani, Y Li, G Zhou
Computer Networks 141, 57-66, 2018
2018
Exploiting Power for Smartphone Security and Privacy
Q Yang
2017
The system can't perform the operation now. Try again later.
Articles 1–13