Chen Wang

Orcid: 0000-0001-9737-1673

Affiliations:
  • Louisiana State University, Baton Rouge, LA, USA
  • Rutgers University, North Brunswick, NJ, USA (former)
  • Stevens Institute of Technology, Hoboken, NJ, USA (former)


According to our database1, Chen Wang authored at least 50 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fast Detection of Handheld Phone-Distracted Driving by Sensing the Driver's Hand-Grip.
IEEE Trans. Veh. Technol., August, 2024

Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand Biometric.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

2023
Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Enhanced In-air Signature Verification via Hand Skeleton Tracking to Defeat Robot-level Replays.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices.
IEEE Trans. Mob. Comput., 2022

Toward Verifying the User of Motion-Controlled Robotic Arm Systems via the Robot Behavior.
IEEE Internet Things J., 2022

PCR-Auth: Solving Authentication Puzzle Challenge with Encoded Palm Contact Response.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Demo: I Am a Robot: First-person Robotic Arm Control with Hand Motions in Virtual Reality.
Proceedings of the Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers, 2022

Remote Robot Control with Low-cost Robotic Arms and Human Motions.
Proceedings of the Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers, 2022

Low-effort User Authentication for Kiosk Systems based on Smartphone User's Gripping Hand Geometry.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Unobtrusive Pedestrian Identification by Leveraging Footstep Sounds with Replay Resistance.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Distracted driving detection by sensing the hand gripping of the phone.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Human perception-enhanced camera system for web conferences leveraging device motions.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Extracting human behavioral biometrics from robot motions.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Notification privacy protection via unobtrusive gripping hand verification using media sounds.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Preventing Handheld Phone Distraction for Drivers by Sensing the Gripping Hand.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Robot Behavior-Based User Authentication for Motion-Controlled Robotic Systems.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Breathing Sound-based Exercise Intensity Monitoring via Smartphones.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Signature Verification Using Critical Segments for Securing Mobile Transactions.
IEEE Trans. Mob. Comput., 2020

WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity.
CoRR, 2020

EchoLock: Towards Low Effort Mobile User Identification.
CoRR, 2020

Wireless Sensing for Human Activity: A Survey.
IEEE Commun. Surv. Tutorials, 2020

User authentication on mobile devices: Approaches, threats and trends.
Comput. Networks, 2020

WalkID: Towards Context Awareness of Smart Home by Identifying Walking Sounds.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Protecting Smartphone Screen Notification Privacy by Verifying the Gripping Hand.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi Signals.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

EchoLock: Towards Low-effort Mobile User Identification Leveraging Structure-borne Echos.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Noninvasive Fine-Grained Sleep Monitoring Leveraging Smartphones.
IEEE Internet Things J., 2019

Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers.
CoRR, 2019

WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Wi-Fi-Enabled Automatic Eating Moment Monitoring Using Smartphones.
Proceedings of the IoT Technologies for HealthCare - 6th EAI International Conference, 2019

Demo: Monitoring Movement Dynamics of Robot Cars and Drones Using Smartphone's Built-in Sensors.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Personal PIN Leakage from Wearable Devices.
IEEE Trans. Mob. Comput., 2018

Poster: Inferring Mobile Payment Passcodes Leveraging Wearable Devices.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Towards In-baggage Suspicious Object Detection Using Commodity WiFi.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Locating Rogue Access Point Using Fine-Grained Channel Information.
IEEE Trans. Mob. Comput., 2017

Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
PIN number-based authentication leveraging physical vibration: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Fine-grained sleep monitoring: Hearing your breathing with smartphones.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Critical segment based real-time E-signature for securing mobile transactions.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Delay and Capacity Analysis in MANETs with Correlated Mobility and ${f}$ -Cast Relay.
IEEE Trans. Parallel Distributed Syst., 2014

Poster: hearing your breathing: fine-grained sleep monitoring using smartphones.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Accurate rogue access point localization leveraging fine-grained channel information.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2012
Throughput capacity in mobile ad-hoc networks with correlated mobility and f-cast relay.
Proceedings of the 2012 IEEE Global Communications Conference, 2012


  Loading...