


default search action
Yan Jia 0009
Person information
- affiliation: Nankai University, College of Cyber Science, Tianjin, China
- affiliation (PhD 2020): Xidian University, School of Cyber Engineering, Xi'an, China
Other persons with the same name
- Yan Jia — disambiguation page
- Yan Jia 0001
— National University of Defense Technology, College of Computer, Changsha, China - Yan Jia 0002 — A*STAR, Data Storage Institute, Singapore (and 1 more)
- Yan Jia 0003 — Anhui University, School of Mathematical Sciences, Hefei, China
- Yan Jia 0004
— Nanjing University of Posts and Telecommunications, School of Geographic and Biologic Information, China (and 1 more) - Yan Jia 0005 — RWTH Aachen University, Germany
- Yan Jia 0006
— Beijing Institute of Technology, School of Mechatronical Engineering, China - Yan Jia 0007 — College of Shenyang artillery, China
- Yan Jia 0008
— University of York, Department of Computer Science, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j6]Bin Yuan, Kaimin Zheng, Yan Jia, Jiajun Ren, Kunming Wang, Shengjiu Shi, Deqing Zou, Hai Jin:
DMCGuard: risky perils and fine-grained control on IoT multiple device management channels. Frontiers Comput. Sci. 20(5): 2005104 (2026)- 2025
[i6]Chenghua Jin, Yan Jia, Yuxin Song, Qingyin Tan, Rui Yang, Zheli Liu:
Security and Privacy Measurement on Chinese Consumer IoT Traffic based on Device Lifecycle. CoRR abs/2505.09929 (2025)- 2024
[j5]Zhiwei Chang, Hanfeng Zhang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu:
Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals. Comput. Commun. 220: 138-148 (2024)
[c13]Fannv He, Yan Jia, Jiayu Zhao, Yue Fang, Jice Wang, Mengyue Feng, Peng Liu, Yuqing Zhang:
Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps. NDSS 2024
[c12]Bin Yuan, Zhanxiang Song, Yan Jia
, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing:
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations. SP 2024: 2385-2403
[i5]Yan Jia, Yuxin Song, Zihou Liu, Qingyin Tan, Fangming Wang, Yu Zhang, Zheli Liu:
A Survey on Consumer IoT Traffic: Security and Privacy. CoRR abs/2403.16149 (2024)
[i4]Zhi Wang, Xin Yang, Du Chen, Han Gao, Meiqi Tian, Yan Jia, Wanpeng Li:
Simple But Not Secure: An Empirical Security Analysis of Two-factor Authentication Systems. CoRR abs/2411.11551 (2024)
[i3]Yuhao Liu, Yingnan Zhou, Hanfeng Zhang, Zhiwei Chang, Sihan Xu, Yan Jia, Wei Wang, Zheli Liu:
Rethinking Software Misconfigurations in the Real World: An Empirical Study and Literature Analysis. CoRR abs/2412.11121 (2024)- 2023
[j4]Yingnan Zhou
, Xue Hu
, Sihan Xu
, Yan Jia
, Yuhao Liu
, Junyong Wang
, Guangquan Xu
, Wei Wang
, Shaoying Liu
, Thar Baker
:
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters. IEEE Trans. Software Eng. 49(10): 4624-4638 (2023)
[c11]Zhiwei Chang, Hanfeng Zhang, Yue Yang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu:
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm. AIS&P (1) 2023: 499-512
[c10]Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing:
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain. USENIX Security Symposium 2023: 3403-3420- 2022
[j3]Bing Jia, Hao Gong, Zhaopeng Zong, Tao Zhou, Thar Baker
, Ahmed Al-Shamma'a, Yan Jia:
An incentive mechanism in expert-decision-based crowdsensing networks. Appl. Soft Comput. 122: 108834 (2022)
[c9]Ze Jin, Luyi Xing, Yiwei Fang
, Yan Jia
, Bin Yuan, Qixu Liu:
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies. CCS 2022: 1647-1661
[c8]Yijing Liu, Yan Jia, Qingyin Tan, Zheli Liu, Luyi Xing:
How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion. USENIX Security Symposium 2022: 863-880
[c7]Xiaojie Guo, Ye Han, Zheli Liu, Ding Wang, Yan Jia, Jin Li:
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes. USENIX Security Symposium 2022: 1487-1504
[i2]Rongkuan Ma, Qiang Wei, Jingyi Wang, Shunkai Zhu, Shouling Ji, Peng Cheng, Yan Jia, Qingxian Wang:
Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study. CoRR abs/2212.14296 (2022)- 2021
[j2]Wei Zhou
, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang
, Le Guan
, Tao Liu
, Yan Jia, Yaowen Zheng, Yuqing Zhang
, Limin Sun, Yazhe Wang, Peng Liu
:
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE Internet Things J. 8(14): 11621-11639 (2021)
[c6]Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zhang
, XiaoFeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang, Deqing Zou, Hai Jin:
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels. CCS 2021: 1289-1305- 2020
[c5]Yan Jia
, Luyi Xing, Yuhang Mao, Dongfang Zhao, XiaoFeng Wang, Shangru Zhao, Yuqing Zhang:
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds. SP 2020: 465-481
[c4]Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang:
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. USENIX Security Symposium 2020: 1183-1200
2010 – 2019
- 2019
[j1]Wei Zhou
, Yan Jia, Anni Peng, Yuqing Zhang
, Peng Liu
:
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet Things J. 6(2): 1606-1616 (2019)
[c3]Yao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Peng Liu, Yuqing Zhang:
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution. ESORICS (1) 2019: 638-657
[c2]Yuhang Mao, Xuejun Li, Yan Jia, Shangru Zhao, Yuqing Zhang:
Security Analysis of Smart Home Based on Life Cycle. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1444-1449
[c1]Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. USENIX Security Symposium 2019: 1133-1150- 2018
[i1]Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps. CoRR abs/1811.03241 (2018)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-05 01:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







