2024
Fall-Attention: An Attention-Based Fall Detection Method for Adjoint Activities.
IEEE Trans. Mob. Comput., July, 2024
RF-Siamese: Approaching Accurate RFID Gesture Recognition With One Sample.
IEEE Trans. Mob. Comput., January, 2024
Universal and Scalable Weakly-Supervised Domain Adaptation.
IEEE Trans. Image Process., 2024
Foolmix: Strengthen the Transferability of Adversarial Examples by Dual-Blending and Direction Update Strategy.
IEEE Trans. Inf. Forensics Secur., 2024
UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples.
IEEE Trans. Inf. Forensics Secur., 2024
Dynamic risk assessment and active response strategy of human-robot collaboration based on fuzzy comprehensive evaluation.
Robotics Comput. Integr. Manuf., 2024
RF-Boundary: RFID-Based Virtual Boundary.
Proceedings of the IEEE INFOCOM 2024, 2024
Selective Learning for Sample-Efficient Training in Multi-Agent Sparse Reward Tasks (Extended Abstract).
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Matching Gains with Pays: Effective and Fair Learning in Multi-Agent Public Goods Dilemmas.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Cautiously-Optimistic Knowledge Sharing for Cooperative Multi-Agent Reinforcement Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Real-Time and Accurate Gesture Recognition With Commercial RFID Devices.
IEEE Trans. Mob. Comput., December, 2023
HearMe: Accurate and Real-Time Lip Reading Based on Commercial RFID Devices.
IEEE Trans. Mob. Comput., December, 2023
More Than Scheduling: Novel and Efficient Coordination Algorithms for Multiple Readers in RFID Systems.
IEEE Trans. Mob. Comput., September, 2023
Receive Only Necessary: Efficient Tag Category Identification in Large-Scale RFID Systems.
IEEE Trans. Mob. Comput., 2023
LSD: Adversarial Examples Detection Based on Label Sequences Discrepancy.
IEEE Trans. Inf. Forensics Secur., 2023
Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey.
IEEE Open J. Comput. Soc., 2023
MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Accurate IoT Device Identification based on A Few Network Traffic.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023
A Fast Adversarial Sample Detection Approach for Industrial Internet-of-Things Applications.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023
A Few-shot-learning-based Method to Object Recognition in Multiple Scenarios.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023
CMMR: A Composite Multidimensional Models Robustness Evaluation Framework for Deep Learning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
Selective Learning for Sample-Efficient Training in Multi-Agent Sparse Reward Tasks.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
An Edge-oriented Deep Learning Model Security Assessment Framework.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
Detecting Adversarial Samples for Deep Learning Models: A Comparative Study.
IEEE Trans. Netw. Sci. Eng., 2022
Time Efficient Tag Searching in Large-Scale RFID Systems: A Compact Exclusive Validation Method.
IEEE Trans. Mob. Comput., 2022
An optimal deployment scheme for extremely fast charging stations.
Peer-to-Peer Netw. Appl., 2022
Efficient and accurate identification of missing tags for large-scale dynamic RFID systems.
J. Syst. Archit., 2022
HashDroid:Extraction of malicious features of Android applications based on function call graph pruning.
Proceedings of the IEEE International Conference on Trust, 2022
WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples.
Proceedings of the IEEE International Conference on Trust, 2022
Multi-task Adversarial Learning for Semi-supervised Trajectory-User Linking.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022
Encoding-based Range Detection in Commodity RFID Systems.
Proceedings of the IEEE INFOCOM 2022, 2022
Goal Consistency: An Effective Multi-Agent Cooperative Method for Multistage Tasks.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
2021
Time-Efficient Target Tags Information Collection in Large-Scale RFID Systems.
IEEE Trans. Mob. Comput., 2021
An Exploit Kits Detection Approach Based on HTTP Message Graph.
IEEE Trans. Inf. Forensics Secur., 2021
EMPC: Energy-Minimization Path Construction for data collection and wireless charging in WRSN.
Pervasive Mob. Comput., 2021
Accurate Respiration Monitoring for Mobile Users With Commercial RFID Devices.
IEEE J. Sel. Areas Commun., 2021
Fast and Reliable Dynamic Tag Estimation in Large-Scale RFID Systems.
IEEE Internet Things J., 2021
Securing middlebox policy enforcement in SDN.
Comput. Networks, 2021
RF-Ubia: User Biometric Information Authentication Based on RFID.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Fast Application Activity Recognition with Encrypted Traffic.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Expandable Fractional Repetition Codes for Distributed Storage Systems.
Proceedings of the IEEE Information Theory Workshop, 2021
Learning to Transfer Under Unknown Noisy Environments: An Universal Weakly-Supervised Domain Adaptation Method.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Square Fractional Repetition Codes for Distributed Storage Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
2020
LSCDroid: Malware Detection Based on Local Sensitive API Invocation Sequences.
IEEE Trans. Reliab., 2020
A Cloud-MEC Collaborative Task Offloading Scheme With Service Orchestration.
IEEE Internet Things J., 2020
Towards Real-time Cooperative Deep Inference over the Cloud and Edge End Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020
When Sharing Economy Meets IoT: Towards Fine-grained Urban Air Quality Monitoring through Mobile Crowdsensing on Bike-share System.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020
Distributed clustering and operational state scheduling in wireless rechargeable sensor networks.
Int. J. Sens. Networks, 2020
Accurate human activity recognition with multi-task learning.
CCF Trans. Pervasive Comput. Interact., 2020
RPAD: An Unsupervised HTTP Request Parameter Anomaly Detection Method.
Proceedings of the 19th IEEE International Conference on Trust, 2020
WSAD: An Unsupervised Web Session Anomaly Detection Method.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Accurate IoT Device Identification from Merely Packet Length.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Real-time and Accurate RFID Tag Localization based on Multiple Feature Fusion.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Why queue up?: fast parallel search of RFID tags for multiple users.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020
RLLL: Accurate Relative Localization of RFID Tags with Low Latency.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
2019
BridgeTaint: A Bi-Directional Dynamic Taint Tracking Method for JavaScript Bridges in Android Hybrid Applications.
IEEE Trans. Inf. Forensics Secur., 2019
PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks.
Secur. Commun. Networks, 2019
Vital Signs Monitoring with RFID: Opportunities and Challenges.
IEEE Netw., 2019
Nothing Blocks Me: Precise and Real-Time LOS/NLOS Path Recognition in RFID Systems.
IEEE Internet Things J., 2019
Range-Based Localization for Sparse 3-D Sensor Networks.
IEEE Internet Things J., 2019
An Energy-Aware Offloading Framework for Edge-Augmented Mobile RFID Systems.
IEEE Internet Things J., 2019
Page-sharing-based virtual machine packing with multi-resource constraints to reduce network traffic in migration for clouds.
Future Gener. Comput. Syst., 2019
Enabling Adaptive Intelligence in Cloud-Augmented Multiple Robots Systems.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019
ReActor: Real-time and Accurate Contactless Gesture Recognition with RFID.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019
Privacy-Protected Blockchain System.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019
ADS-SA: System for Automatically Detecting Sensitive Path of Android Applications Based on Static Analysis.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
2018
A Novel Indoor Localization Algorithm for Efficient Mobility Management in Wireless Networks.
Wirel. Commun. Mob. Comput., 2018
Energy-Aware Temporal Reachability Graphs for Time-Varying Mobile Opportunistic Networks.
IEEE Trans. Veh. Technol., 2018
Big program code dissemination scheme for emergency software-define wireless sensor networks.
Peer-to-Peer Netw. Appl., 2018
Characterizing the Capability of Vehicular Fog Computing in Large-scale Urban Environment.
Mob. Networks Appl., 2018
An optimal algorithm for small group multicast in wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018
Leveraging content similarity among VMI files to allocate virtual machines in cloud.
Future Gener. Comput. Syst., 2018
RFID Localization Based on Multiple Feature Fusion.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018
FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
Key parameters decision for cloud computing: Insights from a multiple game model.
Concurr. Comput. Pract. Exp., 2017
Exploiting distribution of channel state information for accurate wireless indoor localization.
Comput. Commun., 2017
Edge Mesh: A New Paradigm to Enable Distributed Intelligence in Internet of Things.
IEEE Access, 2017
Accurate Indoor Localization with Multiple Feature Fusion.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
A Weight-Bind-Based Safe Top-k Query Processing Scheme in Two-Tiered Sensor Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
A High Throughput Reader Scheduling Algorithm for Large RFID Systems in Smart Environments.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017
Tag size profiling in multiple reader RFID systems.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
2016
Flexible and Time-Efficient Tag Scanning with Handheld Readers.
IEEE Trans. Mob. Comput., 2016
A locality-based range-free localization algorithm for anisotropic wireless sensor networks.
Telecommun. Syst., 2016
Distance outlier detection with a mobile beacon in wireless sensor networks localisation.
Int. J. Secur. Networks, 2016
Who stole my cheese?: Verifying intactness of anonymous RFID systems.
Ad Hoc Networks, 2016
Let's work together: Fast tag identification by interference elimination for multiple RFID readers.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution.
IEEE Trans. Parallel Distributed Syst., 2015
Minimizing Movement for Target Coverage and Network Connectivity in Mobile Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015
Accurate Range-Free Localization for Anisotropic Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2015
Deterministic Detection of Cloning Attacks for Anonymous RFID Systems.
IEEE Trans. Ind. Informatics, 2015
STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems.
IEEE Trans. Computers, 2015
A Component-Based Localization Algorithm for Sparse Sensor Networks Combining Angle and Distance Information.
KSII Trans. Internet Inf. Syst., 2015
Energy-efficient active tag searching in large scale RFID systems.
Inf. Sci., 2015
Algorithmic Methods in Wireless Sensor Network 2014.
Int. J. Distributed Sens. Networks, 2015
Energy Balanced Clustering Data Collection Based on Dominating Set in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2015
2014
Defending collaborative false data injection attacks in wireless sensor networks.
Inf. Sci., 2014
ECN-Based Congestion Probability Prediction over Hybrid Wired-Wireless Networks.
Int. J. Distributed Sens. Networks, 2014
An energy-preserving spectrum access strategy in mobile cognitive radio networks.
Trans. Emerg. Telecommun. Technol., 2014
A Cluster-Based False Data Filtering Scheme in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014
Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
LOCK: A fast and flexible tag scanning mechanism with handheld readers.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014
ArPat: Accurate RFID reader positioning with mere boundary tags.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014
Intactness verification in anonymous RFID systems.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014
2013
Secure localization and location verification in wireless sensor networks: a survey.
J. Supercomput., 2013
Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks.
Comput. Commun., 2013
A Semantic Medical Multimedia Retrieval Approach Using Ontology Information Hiding.
Comput. Math. Methods Medicine, 2013
A Deterministic Sensor Placement Scheme for Full Coverage and Connectivity without Boundary Effect inWireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2013
An energy-preserving spectrum access strategy in cognitive radio networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
A data gathering algorithm based on energy-balanced connected dominating sets in wireless sensor networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
A Bacterial Colony Chemotaxis Algorithm with Self-adaptive Mechanism.
Proceedings of the Intelligent Computing Theories and Technology, 2013
Component-Based Localization for Wireless Sensor Networks Combining Angle and Distance Information.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Time Efficient Tag Searching in Multiple Reader RFID Systems.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
Range-free selective multilateration for anisotropic wireless sensor networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
Complete and fast unknown tag identification in large RFID systems.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Minimizing Movement for Target Coverage in Mobile Sensor Networks.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
An energy-balanced clustering protocol based on dominating set for data gathering in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012
Clique partition based relay placement in WiMAX mesh networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
Anchor supervised distance estimation in anisotropic wireless sensor networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
An Explicit Congestion Control Protocol Based on Bandwidth Estimation.
Proceedings of the Global Communications Conference, 2011
A Buffer Management Scheme Based on Message Transmission Status in Delay Tolerant Networks.
Proceedings of the Global Communications Conference, 2011
2010
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks.
IEEE Trans. Mob. Comput., 2010
Random-walk based approach to detect clone attacks in wireless sensor networks.
IEEE J. Sel. Areas Commun., 2010
On accuracy of region based localization algorithms for wireless sensor networks.
Comput. Commun., 2010
2009
Pollution attack: a new attack against localization in wireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
On Accuracy of Region-based Localization Algorithms for Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
2008
Locating Nodes in Mobile Sensor Networks More Accurately and Faster.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008
2007
Secure Hop-Count Based Localization in Wireless Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007