Dr Jeff Yan
Senior LecturerMachiavelli as a poker mate: a naturalistic behavioural study on strategic deception
Palomäki, J., Yan, J., Laakasuo, M. 08/2016 In: Personality and Individual Differences. 98, p. 266-271. 6 p.
Journal article
"To bluff like a man or fold like a girl?": gender biased deceptive behavior in online poker
Palomäki, J., Yan, J., Modic, D., Laakasuo, M. 6/07/2016 In: PLoS ONE. 11, 7, 13 p.
Journal article
Enhancing sensor pattern noise for source camera identification: an empirical evaluation
Liu, B., Wei, X., Yan, J. 06/2015 In: IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. New York : ACM p. 85-90. 6 p.
Paper
Security analyses of click-based graphical passwords via image point memorability
Zhu, B.B., Yan, J., Yang, M., Wei, D. 3/11/2014 In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York : ACM p. 1217-1231. 15 p.
Paper
Captcha as graphical passwords: a new security primitive based on hard AI problems
Zhu, B.B., Yan, J., Bao, G., Yang, M., Xu, N. 2014 In: IEEE Transactions on Information Forensics and Security. 9, 6, p. 891-904. 14 p.
Journal article
Security design in human computation games
Yu, S.Y., Yan, J. 2014 In: Security Protocols XVIII . Berlin : Springer Verlag p. 142-153. 12 p.
Paper
Security design in human computation games (transcript of discussion)
Yan, J. 2014 In: Security Protocols XVIII. Berlin : Springer Verlag p. 154-160. 7 p. ISBN: 9783662459201. Electronic ISBN: 9783662459218.
Conference contribution
The robustness of hollow CAPTCHAs
Gao, H., Wang, W., Qi, J., Wang, X., Liu, X., Yan, J. 11/2013 In: CCS '13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York : ACM p. 1075-1086. 12 p.
Paper
Security implications of password discretization for click-based graphical passwords
Zhu, B.B., Wei, D., Yang, M., Yan, J. 05/2013 In: WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web. New York : ACM p. 1581-1591. 11 p.
Paper
Towards new security primitives based on hard AI problems
Zhu, B.B., Yan, J. 2013 In: Security Protocols XXI. Berlin : Springer Verlag p. 3-10. 8 p.
Paper
Towards new security primitives based on hard ai problems (Transcript of discussion)
Yan, J. 2013 In: Security Protocols XXI. Berlin : Springer Verlag p. 11-18. 8 p. ISBN: 9783642417160. Electronic ISBN: 9783642417177.
Conference contribution
CAPTCHA design: color, usability, and security
El Ahmad, A.S., Yan, J., Ng, W.Y. 03/2012 In: IEEE Internet Computing. 16, 2, p. 44-51. 8 p.
Journal article
A statistical aimbot detection method for online FPS games
Yu, S.Y., Hammerla, N., Yan, J., Andras, P. 2012 In: Proceedings of the International Joint Conference on Neural Networks (IJCNN). IEEE p. 1-8. 8 p.
Paper
Aimbot detection in online FPS games using a heuristic method based on distribution comparison matrix
Yu, S.Y., Hammerla, N., Yan, J., Andras, P. 2012 In: Neural Information Processing. Berlin : Springer Verlag p. 654-661. 8 p.
Paper
The Robustness of Google CAPTCHAs
El Ahmad, A., Yan, J., Tayara, M. 09/2011 Newcastle Upon Tyne : Newcastle University School of Computing Science. 15 p.
Other report
Captcha robustness: a security engineering perspective
Yan, J., El Ahmad, A.S. 02/2011 In: Computer. 44, 2, p. 54-60. 7 p.
Journal article
Shoulder surfing defence for recall-based graphical passwords
Zakaria, N.H., Griffiths, D., Brostoff, S., Yan, J. 2011 In: SOUPS 2011 - Proceedings of the 7th Symposium on Usable Privacy and Security. New York : ACM
Paper
System security research at Newcastle
Yan, J. 2011 In: Proceedings - 1st SysSec Workshop, SysSec 2011. IEEE p. 94-95. 2 p. ISBN: 9780769545301.
Conference contribution
Attacks and design of image recognition CAPTCHAs
Zhu, B.B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M., Cai, K. 2010 In: CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York : ACM p. 187-200. 14 p. ISBN: 9781450302449.
Chapter
Collusion detection in online bridge
Yan, J. 2010 In: Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence and the Twenty-Second Innovative Applications of Artificial Intelligence Conference . Menlo Park, Calif. : AAAI p. 1510-1515. 6 p.
Paper
CAPTCHA security: a case study
Yan, J., El Ahmad, A.S. 07/2009 In: IEEE Security and Privacy Magazine. 7, 4, p. 22-28. 7 p.
Journal article
An investigation of cheating in online games
Yan, J., Randell, B. 05/2009 In: IEEE Security and Privacy Magazine. 7, 3, p. 37-44. 8 p.
Journal article
Bot, cyborg and automated turing test: (or "putting the humanoid in the protocol")
Yan, J. 2009 In: Security protocols. Berlin : Springer Verlag p. 190-197. 8 p.
Paper
Magic Bullet: a dual-purpose computer game
Yan, J., Yu, S. 2009 In: HCOMP '09 Proceedings of the ACM SIGKDD Workshop on Human Computation. New York : ACM p. 32-33. 2 p.
Paper
Streamlining attacks on CAPTCHAs with a computer game
Yan, J., Yu, S.Y. 2009 In: IJCAI--09, proceedings of the Tweny-First International Joint Conference on Artificial Intelligence. Menlo Park, Calif. : AAAI p. 2095-2100. 6 p.
Paper
A low-cost attack on a Microsoft captcha
Yan, J., El Ahmad, A.S. 2008 In: Proceedings of the 15th ACM conference on Computer and communications security - CCS '08. New York : ACM p. 543-554. 12 p.
Paper
Usability of CAPTCHAs or usability issues in CAPTCHA design
Yan, J., El Ahmad, A.S. 2008 In: SOUPS 2008 - Proceedings of the 4th Symposium on Usable Privacy and Security. New York : ACM p. 44-52. 9 p.
Paper
Breaking visual CAPTCHAs with naive pattern recognition algorithms
Yan, J., El Ahmad, A.S. 12/2007 In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). IEEE p. 279-291. 13 p. ISBN: 0769530605, 9780769530604.
Chapter
Do background images improve "draw a secret" graphical passwords?
Dunphy, P., Yan, J. 2007 In: CCS '07 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07. New York : ACM p. 36-47. 12 p.
Paper
Graphical passwords and qualitative spatial relations
Lin, D., Dunphy, P., Olivier, P., Yan, J. 2007 In: SOUPS '07 Proceedings of the 3rd symposium on Usable privacy and security. New York : ACM p. 161-162. 2 p.
Paper
Is FacePIN secure and usable?
Dunphy, P., Yan, J. 2007 In: SOUPS '07 Proceedings of the 3rd Symposium on Usable Privacy and Security. New York : ACM p. 165-166. 2 p.
Paper
Detecting cheaters for multiplayer games: theory, design and implementation
Yeung, S.F., Lui, J.C.S., Liu, J., Yan, J. 2006 In: 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006. IEEE p. 1178-1182. 5 p. ISBN: 1424400856.
Chapter
Enhancing collaborative spam detection with bloom filters
Yan, J., Cho, P.L. 2006 In: Computer Security Applications Conference, 2006. ACSAC '06. 22nd Annual. IEEE p. 414-428. 15 p.
Paper
A systematic classification of cheating in online games
Yan, J., Randell, B. 2005 In: NetGames '05 Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games. New York : ACM p. 1-9. 9 p.
Paper
Password memorability and security: empirical results
Yan, J., Alan, B., Anderson, R., Grant, A. 2004 In: IEEE Security and Privacy Magazine. 2, 5, p. 25-31. 7 p.
Journal article
Security issues in online games
Yan, J., Choi, H. 2002 In: Electronic Library. 20, 2, p. 125-133. 9 p.
Journal article
Cyber Security of the Internet of Things
29/02/2016 → …
Research