2025
Two-Factor Authentication Based on Acoustic Fingerprinting in Modulation Domain.
IEEE Trans. Mob. Comput., May, 2025
Efficient and Error-Free Secret Key Generation Leveraging Sorted Indices Matching.
IEEE Trans. Mob. Comput., February, 2025
ArmSpy++: Enhanced PIN Inference through Video-based Fine-grained Arm Posture Analysis.
ACM Trans. Priv. Secur., February, 2025
2024
Indoor Location Identification for Smart Speakers Leveraging 3-D Acoustic Images.
IEEE Trans. Mob. Comput., December, 2024
Robust Mobile Two-Factor Authentication Leveraging Acoustic Fingerprinting.
IEEE Trans. Mob. Comput., December, 2024
Secure and Controllable Secret Key Generation Through CSI Obfuscation Matrix Encapsulation.
IEEE Trans. Mob. Comput., December, 2024
Secret Key Generation Based on Manipulated Channel Measurement Matching.
IEEE Trans. Mob. Comput., October, 2024
Robust Indoor Location Identification for Smartphones Using Echoes From Dominant Reflectors.
IEEE Trans. Mob. Comput., May, 2024
PPG-Hear: A Practical Eavesdropping Attack with Photoplethysmography Sensors.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., May, 2024
Secure Mobile Two-Factor Authentication Leveraging Active Sound Sensing.
IEEE Trans. Mob. Comput., February, 2024
OISMic: Acoustic Eavesdropping Exploiting Sound-induced OIS Vibrations in Smartphones.
Proceedings of the 21st Annual IEEE International Conference on Sensing, 2024
TouchTone: Smartwatch Privacy Protection via Unobtrusive Finger Touch Gestures.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024
Physical Layer Secret Key Generation Leveraging Proactive Pilot Contamination.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
mmHand: 3D Hand Pose Estimation Leveraging mmWave Signals.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Secret Key Generation with Adaptive Pilot Manipulation for Matching-Based Method.
Proceedings of the IEEE International Conference on Communications, 2024
2023
User Identification Leveraging Whispered Sound for Wearable Devices.
IEEE Trans. Mob. Comput., March, 2023
DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks.
Proceedings of the IEEE INFOCOM 2023, 2023
Secure and Robust Two Factor Authentication via Acoustic Fingerprinting.
Proceedings of the IEEE INFOCOM 2023, 2023
P<sup>2</sup>Auth: Two-Factor Authentication Leveraging PIN and Keystroke-Induced PPG Measurements.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
EchoImage: User Authentication on Smart Speakers Using Acoustic Signals.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
2022
Acoustic-Sensing-Based Location Semantics Identification Using Smartphones.
IEEE Internet Things J., 2022
mmECG: Monitoring Human Cardiac Cycle in Driving Environments Leveraging Millimeter Wave.
Proceedings of the IEEE INFOCOM 2022, 2022
ArmSpy: Video-assisted PIN Inference Leveraging Keystroke-induced Arm Posture Changes.
Proceedings of the IEEE INFOCOM 2022, 2022
2021
Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Bipartite Graph Matching Based Secret Key Generation.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Breathing Sound-based Exercise Intensity Monitoring via Smartphones.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
2020
Signature Verification Using Critical Segments for Securing Mobile Transactions.
IEEE Trans. Mob. Comput., 2020
WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi Signals.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
2019
Noninvasive Fine-Grained Sleep Monitoring Leveraging Smartphones.
IEEE Internet Things J., 2019
A Flexible Poisoning Attack Against Machine Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Wi-Fi-Enabled Automatic Eating Moment Monitoring Using Smartphones.
Proceedings of the IoT Technologies for HealthCare - 6th EAI International Conference, 2019
2018
Towards practical personalized recommendation with multi-level differential privacy controls.
Proceedings of the IEEE INFOCOM 2018, 2018
2017
Modified Particle Swarm Optimization Algorithm for Engineering Structural Optimization Problem.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
2015
User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems.
IEEE Trans. Mob. Comput., 2015
Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones.
Ad Hoc Sens. Wirel. Networks, 2015
Video: LookUp!: Enabling Pedestrian Safety Services via Shoe Sensing.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
LookUp: Enabling Pedestrian Safety Services via Shoe Sensing.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
Fine-grained sleep monitoring: Hearing your breathing with smartphones.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Critical segment based real-time E-signature for securing mobile transactions.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
On the limits of positioning-based pedestrian risk awareness.
Proceedings of the 2014 Workshop on Mobile Augmented Reality and Robotic Technology-Based Systems, 2014
Poster: hearing your breathing: fine-grained sleep monitoring using smartphones.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing.
Proceedings of the IEEE Global Communications Conference, 2014
2013
Smartphone based user verification leveraging gait recognition for mobile healthcare systems.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
2012
Social closeness based clone attack detection for mobile healthcare system.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
2011
Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching.
Proceedings of the Global Communications Conference, 2011
2010
Detecting wormhole attacks in delay-tolerant networks.
IEEE Wirel. Commun., 2010
A social community based approach for reducing the propagation of infectious diseases in healthcare.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010
Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010