Hongbo Liu

Orcid: 0000-0003-1162-839X

Affiliations:
  • Indiana University - Purdue University Indianapolis, Department of Computer Information and Graphics, IN, USA
  • University of Electronic Science and Technology of China, Chengdu, China


According to our database1, Hongbo Liu authored at least 91 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Scenario-Adaptive Key Establishment Scheme for LoRa-Enabled IoV Communications.
IEEE Trans. Mob. Comput., December, 2024

Indoor Location Identification for Smart Speakers Leveraging 3-D Acoustic Images.
IEEE Trans. Mob. Comput., December, 2024

Robust Mobile Two-Factor Authentication Leveraging Acoustic Fingerprinting.
IEEE Trans. Mob. Comput., December, 2024

Secure and Controllable Secret Key Generation Through CSI Obfuscation Matrix Encapsulation.
IEEE Trans. Mob. Comput., December, 2024

Secret Key Generation Based on Manipulated Channel Measurement Matching.
IEEE Trans. Mob. Comput., October, 2024

Robust Indoor Location Identification for Smartphones Using Echoes From Dominant Reflectors.
IEEE Trans. Mob. Comput., May, 2024

PPG-Hear: A Practical Eavesdropping Attack with Photoplethysmography Sensors.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., May, 2024

Secure Mobile Two-Factor Authentication Leveraging Active Sound Sensing.
IEEE Trans. Mob. Comput., February, 2024

Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery.
IEEE Trans. Inf. Forensics Secur., 2024

Topology-based multi-jammer localization in wireless networks.
Secur. Saf., 2024

Practical Adversarial Attack on WiFi Sensing Through Unnoticeable Communication Packet Perturbation.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

Physical Layer Secret Key Generation Leveraging Proactive Pilot Contamination.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

mmHand: 3D Hand Pose Estimation Leveraging mmWave Signals.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

Secret Key Generation with Adaptive Pilot Manipulation for Matching-Based Method.
Proceedings of the IEEE International Conference on Communications, 2024

Heart of Betrayal: A PIN Inference Attack Leveraging Photoplethysmography on Wearables.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
ChirpKey: A Chirp-level Information-based Key Generation Scheme for LoRa Networks via Perturbed Compressed Sensing.
Proceedings of the IEEE INFOCOM 2023, 2023

Secure and Robust Two Factor Authentication via Acoustic Fingerprinting.
Proceedings of the IEEE INFOCOM 2023, 2023

P<sup>2</sup>Auth: Two-Factor Authentication Leveraging PIN and Keystroke-Induced PPG Measurements.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

EchoImage: User Authentication on Smart Speakers Using Acoustic Signals.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

2022
Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping.
IEEE Wirel. Commun. Lett., 2022

Enabling Secret Key Distribution Over Screen-to-Camera Channel Leveraging Color Shift Property.
IEEE Trans. Mob. Comput., 2022

SpoVis: Decision Support System for Site Selection of Sports Facilities in Digital Twinning Cities.
IEEE Trans. Ind. Informatics, 2022

Breathing-based continuous non-intrusive user verification leveraging commodity WiFi.
J. Commun. Networks, 2022

Acoustic-Sensing-Based Location Semantics Identification Using Smartphones.
IEEE Internet Things J., 2022

Electrical fire monitoring IoT framework for ancient architectural complex leveraging edge computing.
Int. J. Commun. Syst., 2022

mmECG: Monitoring Human Cardiac Cycle in Driving Environments Leveraging Millimeter Wave.
Proceedings of the IEEE INFOCOM 2022, 2022

Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments.
Proceedings of the IEEE INFOCOM 2022, 2022

ArmSpy: Video-assisted PIN Inference Leveraging Keystroke-induced Arm Posture Changes.
Proceedings of the IEEE INFOCOM 2022, 2022

An Improved Least-square based Jammer Localization Algorithm.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

Vehicle-Key: A Secret Key Establishment Scheme for LoRa-enabled IoV Communications.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
Towards Low-Cost Sign Language Gesture Recognition Leveraging Wearables.
IEEE Trans. Mob. Comput., 2021

WiFi-Enabled User Authentication through Deep Learning in Daily Activities.
ACM Trans. Internet Things, 2021

Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Bipartite Graph Matching Based Secret Key Generation.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Breathing Sound-based Exercise Intensity Monitoring via Smartphones.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
Wireless Sensing for Human Activity: A Survey.
IEEE Commun. Surv. Tutorials, 2020

User authentication on mobile devices: Approaches, threats and trends.
Comput. Networks, 2020

LiveScreen: Video Chat Liveness Detection Leveraging Skin Reflection.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones.
IEEE/ACM Trans. Netw., 2019

Implications of smartphone user privacy leakage from the advertiser's perspective.
Pervasive Mob. Comput., 2019

CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Poster: Video Chat Scam Detection Leveraging Screen Light Reflection.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

2018
Authenticating Users Through Fine-Grained Channel Information.
IEEE Trans. Mob. Comput., 2018

RF-Kinect: A Wearable RFID-based Approach Towards 3D Body Movement Tracking.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Device-free Personalized Fitness Assistant Using WiFi.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

PPG-based Finger-level Gesture Recognition Leveraging Wearables.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Multi - Touch in the Air: Device-Free Finger Tracking and Gesture Recognition via COTS RFID.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Towards In-baggage Suspicious Object Detection Using Commodity WiFi.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching.
IEEE Trans. Dependable Secur. Comput., 2017

WiFi-Enabled Smart Human Dynamics Monitoring.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

SubTrack: Enabling Real-Time Tracking of Subway Riding on Mobile Devices.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Secret key distribution leveraging color shift over visible light channel.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors.
IEEE Trans. Mob. Comput., 2016

Uber-in-light: Unobtrusive visible light communication leveraging complementary color channel.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Distributed Consensus-Based Weight Design for Cooperative Spectrum Sensing.
IEEE Trans. Parallel Distributed Syst., 2015

A Low-Cost Wi-Fi-Based Solution for Measuring Human Queues.
GetMobile Mob. Comput. Commun., 2015

Towards Understanding the Advertiser's Perspective of Smartphone User Privacy.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
A Study of Localization Accuracy Using Multiple Frequencies and Powers.
IEEE Trans. Parallel Distributed Syst., 2014

An Error-Minimizing Framework for Localizing Jammers in Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks.
ACM Trans. Sens. Networks, 2014

Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation.
IEEE Trans. Mob. Comput., 2014

Accurate WiFi Based Localization for Smartphones Using Peer Assistance.
IEEE Trans. Mob. Comput., 2014

Tracking human queues using single-point signal monitoring.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Practical user authentication leveraging channel state information (CSI).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Neighborhood prediction based decentralized key management for mobile wireless networks.
Wirel. Networks, 2013

Sensing vehicle dynamics for determining driver phone use.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Measuring human queues using WiFi signals.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

Fast and practical secret key extraction by exploiting channel response.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Towards self-healing smart grid via intelligent local controller switching under jamming.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Exploiting Jamming-Caused Neighbor Changes for Jammer Localization.
IEEE Trans. Parallel Distributed Syst., 2012

Sensing Driver Phone Use with Acoustic Ranging through Car Speakers.
IEEE Trans. Mob. Comput., 2012

Extracting jamming signals to locate radio interferers and jammers.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Push the limit of WiFi based localization for smartphones.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Error minimizing jammer localization through smart estimation of ambient noise.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks.
Wirel. Networks, 2011

Determining the position of a jammer using a virtual-force iterative approach.
Wirel. Networks, 2011

Detecting driver phone use leveraging car speakers.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

Localizing Multiple Jamming Attackers in Wireless Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Distributed Cooperative Spectrum Sensing Based on Weighted Average Consensus.
Proceedings of the Global Communications Conference, 2011

2010
A decentralized key management scheme via neighborhood prediction in mobile wireless networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Characterizing the impact of multi-frequency and multi-power on localization accuracy.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Accuracy characterization of cell tower localization.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010

Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges.
Proceedings of the Distributed Computing in Sensor Systems, 2010

2009
Localizing Jammers in Wireless Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

2008
Self-localization based on improved subspace approach in wireless sensor network.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008


  Loading...