Jie Yang

Orcid: 0000-0002-8244-2181

Affiliations:
  • Florida State University, Tallahassee, FL, USA
  • Stevens Institute of Technology, Hoboken, NJ, USA (PhD 2011)


According to our database1, Jie Yang authored at least 128 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SpaceBeat: Identity-aware Multi-person Vital Signs Monitoring Using Commodity WiFi.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., August, 2024

EarSlide: a Secure Ear Wearables Biometric Authentication Based on Acoustic Fingerprint.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2024

Multi-Subject 3D Human Mesh Construction Using Commodity WiFi.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2024

2023
A Phoneme Localization Based Liveness Detection for Text-Independent Speaker Verification.
IEEE Trans. Mob. Comput., October, 2023

Person Re-identification in 3D Space: A WiFi Vision-based Approach.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Enabling Fine-Grained Finger Gesture Recognition on Commodity WiFi Devices.
IEEE Trans. Mob. Comput., 2022

A Continuous Articulatory-Gesture-Based Liveness Detection for Voice Authentication on Smart Devices.
IEEE Internet Things J., 2022

Commodity WiFi Sensing in Ten Years: Status, Challenges, and Opportunities.
IEEE Internet Things J., 2022

ToothSonic: Earable Authentication via Acoustic Toothprint.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

GoPose: 3D Human Pose Estimation Using WiFi.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

3D Human Mesh Construction Leveraging Wi-Fi.
CoRR, 2022

Robust Person Identification: A WiFi Vision-based Approach.
CoRR, 2022

3D Human Pose Estimation for Free-from and Moving Activities Using WiFi.
CoRR, 2022

Ear Wearable (Earable) User Authentication via Acoustic Toothprint.
CoRR, 2022

Wi-Mesh: A WiFi Vision-Based Approach for 3D Human Mesh Construction.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

A Vision-Based Approach for Commodity WiFi Sensing.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Liquid level detection using wireless signals.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

A wifi vision-based 3D human mesh reconstruction.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Person re-identification using wifi signals.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Excerpt of ToothSonic: Earable Authentication via Acoustic Toothprint.
Proceedings of the Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers, 2022

Poster: Fingerprint-Face Friction Based Earable Authentication.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: A WiFi Vision-based Approach to Person Re-identification.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
EarDynamic: An Ear Canal Deformation Based Continuous User Authentication Using In-Ear Wearables.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Winect: 3D Human Pose Tracking for Free-form Activity Using Commodity WiFi.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Commodity Wi-Fi Sensing in 10 Years: Current Status, Challenges, and Opportunities.
CoRR, 2021

3D Human Pose Estimation for Free-form Activity Using WiFi Signals.
CoRR, 2021

An Ear Canal Deformation Based User Authentication Using Ear Wearable Devices.
CoRR, 2021

Liquid Sensing Using WiFi Signals.
CoRR, 2021

A Continuous Liveness Detection System for Text-independent Speaker Verification.
CoRR, 2021

Acoustic-based Object Detection for Pedestrian Using Smartphone.
CoRR, 2021

Multi-User Activity Recognition and Tracking Using Commodity WiFi.
CoRR, 2021

Object Sensing for Fruit Ripeness Detection Using WiFi Signals.
CoRR, 2021

A Continuous Liveness Detection for Voice Authentication on Smart Devices.
CoRR, 2021

Fine-grained Finger Gesture Recognition Using WiFi Signals.
CoRR, 2021

3D Human Pose Estimation Using WiFi Signals.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

An ear canal deformation based continuous user authentication using earables.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Tracking free-form activity using wifi signals.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Earable Authentication via Acoustic Toothprint.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Signature Verification Using Critical Segments for Securing Mobile Transactions.
IEEE Trans. Mob. Comput., 2020

Liquid Level Sensing Using Commodity WiFi in a Smart Home Environment.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Multi-Level Graph Convolutional Network with Automatic Graph Learning for Hyperspectral Image Classification.
CoRR, 2020

VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Implications of smartphone user privacy leakage from the advertiser's perspective.
Pervasive Mob. Comput., 2019

Noninvasive Fine-Grained Sleep Monitoring Leveraging Smartphones.
IEEE Internet Things J., 2019

Origin-sensitive Control Flow Integrity.
Proceedings of the 28th USENIX Security Symposium, 2019

MultiTrack: Multi-User Tracking and Activity Recognition Using Commodity WiFi.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Authenticating Users Through Fine-Grained Channel Information.
IEEE Trans. Mob. Comput., 2018

Monitoring Vital Signs and Postures During Sleep Using WiFi Signals.
IEEE Internet Things J., 2018

ObstacleWatch: Acoustic-based Obstacle Collision Detection for Pedestrian Using Smartphone.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Sensing Fruit Ripeness Using Wireless Signals.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
Locating Rogue Access Point Using Fine-Grained Channel Information.
IEEE Trans. Mob. Comput., 2017

Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching.
IEEE Trans. Dependable Secur. Comput., 2017

Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors.
IEEE Trans. Mob. Comput., 2016

WiFinger: leveraging commodity WiFi for fine-grained finger gesture recognition.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Towards safer texting while driving through stop time prediction.
Proceedings of the First ACM International Workshop on Smart, 2016

Fine-grained gesture recognition using WiFi.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Leveraging wearables for steering and driver tracking.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Secure Data Outsourcing with Adversarial Data Dependency Constraints.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Protecting Multi-Lateral Localization Privacy in Pervasive Environments.
IEEE/ACM Trans. Netw., 2015

An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization.
IEEE Trans. Mob. Comput., 2015

Sensing Human-Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones.
IEEE Trans. Mob. Comput., 2015

User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems.
IEEE Trans. Mob. Comput., 2015

A Low-Cost Wi-Fi-Based Solution for Measuring Human Queues.
GetMobile Mob. Comput. Commun., 2015

Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones.
Ad Hoc Sens. Wirel. Networks, 2015

Sensing Ambient Light for User Experience-Oriented Color Scheme Adaptation on Smartphone Displays.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Toward Detection of Unsafe Driving with Wearables.
Proceedings of the 2015 workshop on Wearable Systems and Applications, 2015

Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Snooping Keystrokes with mm-level Audio Ranging on a Single Phone.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Fine-grained sleep monitoring: Hearing your breathing with smartphones.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Towards Understanding the Advertiser's Perspective of Smartphone User Privacy.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Critical segment based real-time E-signature for securing mobile transactions.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Pervasive Wireless Environments: Detecting and Localizing User Spoofing
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-07356-9, 2014

A Study of Localization Accuracy Using Multiple Frequencies and Powers.
IEEE Trans. Parallel Distributed Syst., 2014

Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation.
IEEE Trans. Mob. Comput., 2014

Accurate WiFi Based Localization for Smartphones Using Peer Assistance.
IEEE Trans. Mob. Comput., 2014

Tracking human queues using single-point signal monitoring.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Poster: hearing your breathing: fine-grained sleep monitoring using smartphones.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Robot-assisted human indoor localization using the Kinect sensor and smartphones.
Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2014

Multi-lateral privacy-preserving localization in pervasive environments.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environments.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing.
Proceedings of the IEEE Global Communications Conference, 2014

Accurate rogue access point localization leveraging fine-grained channel information.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Practical user authentication leveraging channel state information (CSI).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2013

E<sup>3</sup>: energy-efficient engine for frame rate adaptation on smartphones.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

Smartphone based user verification leveraging gait recognition for mobile healthcare systems.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Sensing vehicle dynamics for determining driver phone use.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Measuring human queues using WiFi signals.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

Proactive call drop avoidance in UMTS networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Adaptive device-free passive localization coping with dynamic target speed.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Fast and practical secret key extraction by exploiting channel response.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Towards self-healing smart grid via intelligent local controller switching under jamming.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Achieving robust wireless localization resilient to signal strength attacks.
Wirel. Networks, 2012

Sensing Driver Phone Use with Acoustic Ranging through Car Speakers.
IEEE Trans. Mob. Comput., 2012

Toward attack-resistant localization under infrastructure attacks.
Secur. Commun. Networks, 2012

Securing Mobile Location-based Services through position verification leveraging key distribution.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Push the limit of WiFi based localization for smartphones.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments.
Ad Hoc Sens. Wirel. Networks, 2011

Tracking vehicular speed variations by warping mobile phone signal strengths.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Detecting driver phone use leveraging car speakers.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Designing localization algorithms robust to signal strength attacks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching.
Proceedings of the Global Communications Conference, 2011

2010
Detecting wormhole attacks in delay-tolerant networks.
IEEE Wirel. Commun., 2010

Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks.
IEEE Trans. Veh. Technol., 2010

Empirical Evaluation of Wireless Localization when Using Multiple Antennas.
IEEE Trans. Parallel Distributed Syst., 2010

A social community based approach for reducing the propagation of infectious diseases in healthcare.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2010

Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Mobile Sensing Enabled Robust Detection of Security Threats in Urban Environments.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

Characterizing the impact of multi-frequency and multi-power on localization accuracy.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Accuracy characterization of cell tower localization.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Vehicular speed estimation using received signal strength from mobile phones.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

2009
DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices.
IEEE Trans. Mob. Comput., 2009

Detecting Spoofing Attacks in Mobile Wireless Environments.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Empirical Evaluation of the Limits on Localization Using Signal Strength.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Indoor Localization Using Improved RSS-Based Lateration Methods.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
The Impact of Using Multiple Antennas on Wireless Localization.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Detecting sybil attacks inwireless and sensor networks using cluster analysis.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

DECODE : Detecting co-moving wireless devices.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

A theoretical analysis of wireless localization using RF-based fingerprint matching.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008


  Loading...