陈艳姣 照片

陈艳姣

研究员

所属大学: 浙江大学

所属学院: 电气工程学院

邮箱:
chenyanjiao@zju.edu.cn

个人主页:
https://person.zju.edu.cn/0020875

个人简介

教育及工作经历 2020.12-至今 计划研究员,电气工程学院,浙江大学 2016.05-2020.10 研究员,计算机学院,武汉大学 2015.05-2016.04 博士后,电子计算机学院,多伦多大学 2010.09-2015.02 博士,计算机科学与工程系,香港科技大学 2006.09-2010.06 本科,电子工程系,清华大学 联系信息 地址 浙江大学玉泉校区第二教学大楼325室 Email chenyanjiao@zju.edu.cn, chenyj.thu@gmail.com. 研究团队 智能系统安全实验室(USSLAB),实验室在研多个跟物联网安全、人工智能、智能电网相关的课题,欢迎保研、考研的研究生同学和有兴趣的本科生加入实验室。 奖励荣誉 2024年 N2Women全球计算通信女性协会“Top 10 Rising Star” 2022年 浙江省科学技术进步奖一等奖(排名4/13) 2024年 阿里青橙奖“最具潜力奖” 2024年 中国电子学会自然科学奖一等奖(排名5/5) 2021年 中国科协青年人才托举工程 2023年 CCF-蚂蚁科研基金优秀应用项目《深度学习模型隐私安全技术研究》 2015年 香港青年科学家奖荣誉奖 2016年 ACM-新星奖(武汉) 2022年 CCS Top Reviewer Award 2013年 Google China优秀博士奖

研究领域

人工智能安全 智能语音安全 物联网安全

学术兼职

期刊编委 Associate Editor, IEEE Transactions on Information Forensics and Security (CCF A), 2023-至今 Editor, IEEE Wireless Communications Letters, 2019-2021 Area topic editor, International Journal of Distributed Sensor Networks, 2019-至今 Editor, Transactions on Emerging Telecommunications Technologies, 2016-至今 Editor, Frontiers in Signal Processing, 2020-至今 Guest editor, SI AI-based Security and Privacy for IoT Applications, Sensors, 2023 国际会议TPC Co-Chair International Conference on Artificial Intelligence in Education Technology, 2023 The International Conference on Edge Computing and IoT Systems, Management and Security, 2021 国际会议TPC Member USENIX Security (CCF A,安全四大) 2024,2025 ACM CCS (CCF A,安全四大) 2023, 2024,2025 NDSS (CCF A,安全四大) 2022,2023,2024 IEEE INFOCOM (CCF A) 2017,2019,2020,2021,2022,2023,2024,2025 ACM AsiaCCS 2024,2025 IEEE ICNP 2020 IEEE IWQoS 2020 IEEE TrustCom 2022, 2023,2024 IEEE GLOBECOM 2019,2020,2021,2022,2023,2024 IEEE ICC 2025 IEEE MSN 2023 IEEE ISPA 2023 IEEE HPCC 2024 IEEE PIMRC 2020 其他 IEEE Senior Member 国际计算机网络女性协会N2Women Geodiversity Co-chair CCF互联网专委会委员、物联网专委会委员、女计算机工作委员会委员

近期论文

Book and Book Chapters Yanjiao Chen, Qian Zhang. “Dynamic Spectrum Auction in Wireless Communication,” Springer, 2015. Journal & Conference Papers 2025: Jiangyi Deng, Xinfeng Li, Yanjiao Chen*, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu. “RACONTEUR: A Knowledgeable, Insightful and Portable LLM-Powered Shell Command Explainer,” The Network and Distributed System Security Symposium (NDSS). (CCF A, 安全四大) Hanlei Zhang, Yijie Bai, Yanjiao Chen*, Zhongming Ma, Wenyuan Xu. “BARBIE: Robust Backdoor Detection Based on Latent Separability,” The Network and Distributed System Security Symposium (NDSS). (CCF A, 安全四大) Meng Xue, Yinan Zhu, Wentao Xie, Zhixian Wang, Yanjiao Chen, Kui Jiang, Qian Zhang. “MobHAR: Source-Free Knowledge Transfer for Human Activity Recognition on Mobile Devices” ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), accepted. (CCF A) 2024: Jiangyi Deng, Shengyuan Pang, Yanjiao Chen*, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu. “SOPHON: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models,” IEEE Symposium on Security and Privacy. (CCF A, 安全四大) Yijie Bai, Zhongming Ma, Yanjiao Chen*, Jiangyi Deng, Shengyuan Pang, Yan Liu, Wenyuan Xu. “Alchemy: Data-Free Adversarial Training,” ACM Conference on Computer and Communications Security (CCS). (CCF A, 安全四大) Jialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen*, Jiayang Xu, Xinfeng Li, Wenyuan Xu. “Legilimens: Practical and Unified Content Moderation for Large Language Model Services,” ACM Conference on Computer and Communications Security (CCS). (CCF A, 安全四大) Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu. “SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models,” ACM Conference on Computer and Communications Security (CCS). (CCF A, 安全四大) Xueluan Gong, Rubin Wei, Ziyao Wang, Yuchen Sun, Jiawen Peng, Yanjiao Chen, Qian Wang. “Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions,” ACM Conference on Computer and Communications Security (CCS). (CCF A, 安全四大) Xiuwen Liu, Yanjiao Chen*, Shanchen Pang. “Defending Against Membership Inference Attack for Counterfactual Federated Recommendation with Differentially Private Representation Learning,” IEEE Transactions on Information Forensics and Security (TIFS). (CCF A) Xueluan Gong, Shuaike Li, Yanjiao Chen, Mingzhe Li, Rubin Wei, Qian Wang, Kwok-Yan Lam. “Augmenting Model Extraction Attacks against Disruption-based Defenses,” IEEE Transactions on Information Forensics and Security (TIFS). (CCF A) Xiuwen Liu, Yanjiao Chen*, Shanchen Pang. “Trading off Coverage and Emergency for Hybrid Task Scheduling in Traffic Anomaly Detection,” IEEE Transactions on Mobile Computing (TMC). (CCF A) Yanlong Qiu, Jiaxi Zhang, Tao Sun, Yanjiao Chen, Jin Zhang, Bo Ji. “WASTON: Inferring Critical Information to Enable Spoofing Attacks using COTS mmWave Radar,” IEEE Transactions on Dependable and Secure Computing (TDSC). (CCF A) Meng Xue, Zhixian Wang, Qian Zhang*, Xueluan Gong, Zhihang Liu, Yanjiao Chen*. “ARTEMIS: Defending against Backdoor Attacks via Distribution Shift,” IEEE Transactions on Dependable and Secure Computing (TDSC). (CCF A) Yuan Wu, Shoudu Bai, Meiqin Fu, Xinrong Hu, Weibing Zhong, Lei Ding*, Yanjiao Chen. “TeethFa: Real-time, Hand-free Teeth Gestures Interaction Using Fabric Sensors,” IEEE Internet of Things Journal, accepted. (SCI 1区) 2023: Yanjiao Chen, Rui Guan, Xueluan Gong, Jianshuo Dong, Meng Xue. “D-DAE: Defense-Penetrating Model Extraction Attacks,” IEEE Symposium on Security and Privacy. (CCF A, 安全四大) Xueluan Gong, Yanjiao Chen, Wang Yang, Qian Wang, Yuzhe Gu, Huayang Huang, Chao Shen. “Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation,” IEEE Symposium on Security and Privacy. (CCF A, 安全四大) Yijie Bai, Yanjiao Chen*, Hanlei Zhang, Wenyuan Xu, Haiqin Weng, Dou Goodman. “VILLAIN: Backdoor Attacks Against Vertical Split Learning,” USENIX Security Symposium. (CCF A, 安全四大) Jiangyi Deng, Fei Teng, Yanjiao Chen*, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu. “V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization,” USENIX Security Symposium. (CCF A, 安全四大) Jiangyi Deng, Yanjiao Chen*, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu. “Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion,” USENIX Security Symposium. (CCF A, 安全四大) Lingshuo Meng, Yijie Bai, Yanjiao Chen*, Yutong Hu, Wenyuan Xu, Haiqin Weng. “Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration,” ACM Conference on Computer and Communications Security (CCS). (CCF A, 安全四大) Xueluan Gong, Ziyao Wang, Yanjiao Chen, Qian Wang, Cong Wang, Chao Shen. “NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples,” ACM International World Wide Web Conferences. (CCF A) Boyang Zhou, Chen Zhang, Zhiqiang He, Zeyuan Liu, Yanjiao Chen*, Wenyuan Xu, Baochun Li. “OBLIVION: Poisoning Federated Learning by Inducing Catastrophic Forgetting,” IEEE International Conference on Computer Communications (INFOCOM). (CCF A) Xueluan Gong, Ziyao Wang, Yanjiao Chen, Qian Wang, Yuzhe Gu, Meng Xue. “Kaleidoscope: Physical Backdoor Attacks against Deep Neural Networks with RGB Filters,” IEEE Transactions on Dependable and Secure Computing (TDSC), 20(6): 4993-5004. (CCF A) Xueluan Gong, Zheng Fang, Bowei Li, Yanjiao Chen, Qian Wang. “PALETTE: Physically-Realizable Backdoor Attacks Against Video Recognition Models,” IEEE Transactions on Dependable and Secure Computing (TDSC), 21(4): 2672-2685. (CCF A) Xueluan Gong, Yanjiao Chen, Huayang Huang, Weihan Kong, Ziyao Wang, Chao Shen, Qian Wang. “KerbNet: A QoE-aware Kernel-Based Backdoor Attack Framework,” IEEE Transactions on Dependable and Secure Computing (TDSC). (CCF A) Meng Xue, Peng Kuang, Xueluan Gong, Yanjiao Chen, Qian Zhang, Ruoting Li. “Echo: Reverberation-based Fast Black-Box Adversarial Attacks on Intelligent Audio Systems,” ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 7(3): 1-24. (CCF A) Xueluan Gong, Ziyao Wang, Shuaike Li, Yanjiao Chen*, Qian Wang*. “A GAN-based Defense Framework against Model Inversion Attacks,” IEEE Transactions on Information Forensics and Security (TIFS), 18:4475-4487. (CCF A) Yuan Wu, Jian Zhang*, Yanjiao Chen*, Wuxuan Shi, Huiri Tan. “MC-Tracking: Towards Ubiquitous Menstrual Cycle Tracking using the Smartphone,” IEEE Transactions on Mobile Computing (TMC), accepted. (CCF A) Runmin Ou, Yanjiao Chen*, Yangtao Deng. “WiWalk: Gait-based Dual-user Identification Using WiFi Device,” IEEE Internet of Things Journal, 10(6):5321-5334. (SCI 1区) Yanlong Qiu, Jiaxi Zhang, Yanjiao Chen, Jin Zhang, Bo Ji. “Radar^2: Passive Spy Radar Detection and Localization using COTS mmWave Radar,” IEEE Transactions on Information Forensics and Security (TIFS), 18: 2810-2825. (CCF A) 2022: Jiangyi Deng, Yanjiao Chen*, Wenyuan Xu. “FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems,” ACM Conference on Computer and Communications Security (CCS). (CCF A, 安全四大) Xueluan Gong, Yanjiao Chen*, Jianshuo Dong, Qian Wang. “ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks,” The Network and Distributed System Security Symposium (NDSS). (CCF A, 安全四大) Meng Xue, Yanjiao Chen, Xueluan Gong, Jian Zhang, Chunkai Fan. “Wet-Ra: Monitoring Diapers Wetness with Wireless Signals,” ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 6(2): 1-26. (CCF A) Yanjiao Chen, Zhicong Zheng, Xueluan Gong*. “MARNet: Backdoor Attacks against Cooperative Multi-Agent Reinforcement Learning,” IEEE Transactions on Dependable and Secure Computing (TDSC), 20(5): 4188-4198. (CCF A) Xiaoyan Yin, Wanyu Lin, Kenxin Sun, Chun Wei, Yanjiao Chen*. “A2S2-GNN: Rigging GNN-based Social Status by Adversarial Attack in Signed Social Networks,” IEEE Transactions on Information Forensics and Security (TIFS), 18: 206-220. (CCF A) Jian Zhang, Yuan Wu, Yanjiao Chen*, Tong Chen, “Health-Radio: Towards Contactless Myocardial Infarction Detection using Radio Signals,” IEEE Transactions on Mobile Computing (TMC), 21(2): 585-597. (CCF A) Yang Yang, Yanjiao Chen*, Fei Chen, Jing Chen. “An Efficient Identity-based Provable Data Possession Protocol with Compressed Cloud Storage,” IEEE Transactions on Information Forensics and Security (TIFS), 17: 1359-1371. (CCF A) Yanjiao Chen, Runmin Ou, Zhiyang Li, Kaishun Wu*. “WiFace: Facial Expression Recognition Using Wi-Fi Signals,” IEEE Transactions on Mobile Computing (TMC), 21(1), 378-391. (CCF A) Yanjiao Chen, Meng Xue, Jian Zhang, Runmin Ou, Qian Zhang, Peng Kuang. “DetectDUI: An In-Car Detection System for Drink Driving and BACs,” IEEE/ACM Transactions on Networking (TON), 30(2): 896-910. (CCF A) Yanjiao Chen, Xin Tian, Qian Wang, Jianlin Jiang, Qian Zhang, Minghui Li*, “SAFE: A General Secure and Fair Auction Framework for Wireless Markets with Privacy Preservation,” IEEE Transactions on Dependable and Secure Computing (TDSC), 19(3): 2038-2053. (CCF A) Meng Xue, Yanjiao Chen*, Xueluan Gong, Houze Cao, Jian Zhang, Qian Zhang. “Meta-learning for Human-centered Wireless Sensing: Architecture, Applications, and Challenges,” IEEE Network, 37(1): 88-94. (SCI 1区) Yanjiao Chen, Xueluan Gong, Qian Wang*, Xing Di, Huayang Huang. “Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers,” IEEE Network, 36(1): 84-90. (SCI 1区) Xueluan Gong, Yanjiao Chen, Weihan Kong, Qian Wang*. “Backdoor Attacks and Defenses in Federated Learning: State-of-the-art, Taxonomy, and Future Directions,” IEEE Wireless Communications, 30(2): 114-121. (SCI 1区) Yanjiao Chen, Xiaotian Zhu, Xueluan Gong, Xinjing Yi, Shuyang Li. “Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-the-art, and Future Directions,” IEEE Transactions on Industrial Informatics (TII), 19(1): 20-28. (SCI 1区) 龚雪鸾,陈艳姣*,王涛,曹雨欣. “SeqGANPass:使用序列生成式对抗网络进行口令猜测”,电子学报,51(5): 1148. (中文CCF A) 陈艳姣,朱笑天,于永瑞,程子英,“区块链闪电网络实证分析:拓扑、发展和收费策略”,软件学报,33(10): 3858-3873. (中文CCF A) 2021: Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu. “FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants,” ACM Conference on Computer and Communications Security (CCS). (CCF A, 安全四大) Xueluan Gong, Yanjiao Chen*, Wenbin Yang, Guanghao Mei, Qian Wang*. “InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion,” International Joint Conference on Artificial Intelligence (IJCAI). (CCF A) Yanjiao Chen, Meng Xue, Jian Zhang, Qianyun Guan, Zhiyuan Wang, Qian Zhang. “ChestLive: Fortifying Voice-based Authentication with Chest Motion Biometric on Smart Devices,” ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 5(4), 1-25. (CCF A) Xueluan Gong, Yanjiao Chen*, Qian Wang, Huayang Huang, Lingshuo Meng, Chao Shen, Qian Zhang. “Defense-Resistant Backdoor Attacks against Deep Neural Networks in Outsourced Cloud Environment,” IEEE Journal on Selected Areas in Communications (JSAC) Series on Machine Learning for Communications and Networks, 39(8): 2617-2631. (CCF A) Yang Yang, Yanjiao Chen*, Fei Chen. “A Compressive Integrity Auditing Protocol for Secure Cloud Storage,” IEEE/ACM Transactions on Networking (TON), 29(3), 1197-1209. (CCF A) Yanjiao Chen*, Long Lin, Baochun Li, Qian Wang, Qian Zhang. “Silhouette: Efficient Cloud Configuration Exploration for Large-Scale Analytics,” IEEE Transactions on Parallel and Distributed Systems (TPDS), 32(8), 2049-2061. (CCF A) Jian Zhang, Hongliang Bi, Yanjiao Chen*, Zhekai Ming, Zicun Zhao. “SmartSO: Chinese Character and Stroke Order Recognition with Smartwatch,” IEEE Transactions on Mobile Computing (TMC), 20(7), 2490-2504. (CCF A) Xiaoyan Yin, Xiao Hu, Yanjiao Chen*, Xu Yuan, Baochun Li, “Signed-PageRank: An Efficient Influence Maximization Framework for Signed Social Networks,” IEEE Transactions on Knowledge and Data Engineering (TKDE), 33(5): 2208-2222. (CCF A) Zhenchang Xia, Shan Xue, Jia Wu*, Yanjiao Chen, Junjie Chen, Libing Wu*, “Deep Reinforcement Learning for Smart City Communication Networks,” IEEE Transactions on Industrial Informatics (TII), 17(6), 4188-4196. (SCI 1区) Man Zhou, Qian Wang*, Jingxiao Yang, Qi Li, Yanjiao Chen, Peipei Jiang. “Stealing Your Android Patterns via Acoustic Signals”, IEEE Transactions on Mobile Computing (TMC), 20(4), 1656-1671. (CCF A) 2020: Shuangke Wu, Yanjiao Chen*, Minghui Li, Xiangyang Luo, Zhe Liu, Lan Liu. “Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools,” IEEE/ACM Transactions on Networking (TON), 28(2): 874-887. (CCF A) Yanjiao Chen*, Long Lin, Baochun Li. “Razor: Scaling Backend Capacity for Mobile Applications,” IEEE Transactions on Mobile Computing (TMC), 19(7): 1702-1714. (CCF A) Libing Wu, Jingxiao Yang, Man Zhou, Yanjiao Chen*, Qian Wang. “LVID: A Multimodal Biometrics Authentication System on Smartphones,” IEEE Transactions on Information Forensics and Security (TIFS), 15: 1572-1585. (CCF A) Salma S. Emara, Baochun Li, Yanjiao Chen. “Eagle: Refining Congestion Control by Learning from the Experts,” IEEE International Conference on Computer Communications (INFOCOM). (CCF A) 江沛佩,王骞*,陈艳姣,李琦,沈超,“区块链网络安全保障:攻击与防御”,通信学报,42(1): 151-162. (CCF A) Yanjiao Chen, Baolin Zheng, Zihan Zhang, Qian Wang, Chao Shen, Qian Zhang, “Deep Learning on Mobile and Embedded Devices: State-of-the-Art, Challenges and Future Directions”, ACM Computing Surveys, 53(4):1-37. (SCI 1区) Yanjiao Chen, Xueluan Gong, Qian Wang*, Xing Di, Huayang Huang. “Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments,” IEEE Network, 34(5): 141-147. (SCI 1区) Xueluan Gong, Yanjiao Chen*, Qian Wang*, Wang Yang, Xinchang Jiang. “Model Extraction Attacks and Defenses on Cloud-based Machine Learning Models,” IEEE Wireless Communications Magazine, 58(12), 83-89. (SCI 1区) Yang Yang, Yangjiao Chen*, Wei Wang, Gang Yang, “Securing Channel State Information in Multiuser MIMO With Limited Feedback,” IEEE Transactions on Wireless Communications (TWC), 19(5): 3091-3103. (SCI 1区) Xiuwen Liu, Jianming Fu, Yanjiao Chen*. “Event Evolution Model for Cybersecurity Event Mining in Tweet Streams,” Elsevier Information Sciences, 524: 254-276. (SCI 1区) Lingchen Zhao, Qian Wang, Qin Zou*, Yan Zhang, Yanjiao Chen. “Privacy-Preserving Collaborative Deep Learning with Unreliable Participants,” IEEE Transactions on Information Forensics and Security (TIFS), 15:1486-1500. (CCF A)