Yanzhi Ren

Orcid: 0000-0002-2286-1384

According to our database1, Yanzhi Ren authored at least 43 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secret Key Generation Based on Manipulated Channel Measurement Matching.
IEEE Trans. Mob. Comput., October, 2024

Robust Indoor Location Identification for Smartphones Using Echoes From Dominant Reflectors.
IEEE Trans. Mob. Comput., May, 2024

PPG-Hear: A Practical Eavesdropping Attack with Photoplethysmography Sensors.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., May, 2024

Secure Mobile Two-Factor Authentication Leveraging Active Sound Sensing.
IEEE Trans. Mob. Comput., February, 2024

TouchTone: Smartwatch Privacy Protection via Unobtrusive Finger Touch Gestures.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024

Physical Layer Secret Key Generation Leveraging Proactive Pilot Contamination.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

mmHand: 3D Hand Pose Estimation Leveraging mmWave Signals.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

Secret Key Generation with Adaptive Pilot Manipulation for Matching-Based Method.
Proceedings of the IEEE International Conference on Communications, 2024

2023
User Identification Leveraging Whispered Sound for Wearable Devices.
IEEE Trans. Mob. Comput., March, 2023

DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks.
Proceedings of the IEEE INFOCOM 2023, 2023

Secure and Robust Two Factor Authentication via Acoustic Fingerprinting.
Proceedings of the IEEE INFOCOM 2023, 2023

P<sup>2</sup>Auth: Two-Factor Authentication Leveraging PIN and Keystroke-Induced PPG Measurements.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

EchoImage: User Authentication on Smart Speakers Using Acoustic Signals.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

2022
Acoustic-Sensing-Based Location Semantics Identification Using Smartphones.
IEEE Internet Things J., 2022

mmECG: Monitoring Human Cardiac Cycle in Driving Environments Leveraging Millimeter Wave.
Proceedings of the IEEE INFOCOM 2022, 2022

ArmSpy: Video-assisted PIN Inference Leveraging Keystroke-induced Arm Posture Changes.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Bipartite Graph Matching Based Secret Key Generation.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Breathing Sound-based Exercise Intensity Monitoring via Smartphones.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
Signature Verification Using Critical Segments for Securing Mobile Transactions.
IEEE Trans. Mob. Comput., 2020

WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi Signals.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
Noninvasive Fine-Grained Sleep Monitoring Leveraging Smartphones.
IEEE Internet Things J., 2019

A Flexible Poisoning Attack Against Machine Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Wi-Fi-Enabled Automatic Eating Moment Monitoring Using Smartphones.
Proceedings of the IoT Technologies for HealthCare - 6th EAI International Conference, 2019

2018
Towards practical personalized recommendation with multi-level differential privacy controls.
Proceedings of the IEEE INFOCOM 2018, 2018

2017
Modified Particle Swarm Optimization Algorithm for Engineering Structural Optimization Problem.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2015
User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems.
IEEE Trans. Mob. Comput., 2015

Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones.
Ad Hoc Sens. Wirel. Networks, 2015

Video: LookUp!: Enabling Pedestrian Safety Services via Shoe Sensing.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

LookUp: Enabling Pedestrian Safety Services via Shoe Sensing.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Fine-grained sleep monitoring: Hearing your breathing with smartphones.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Critical segment based real-time E-signature for securing mobile transactions.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
On the limits of positioning-based pedestrian risk awareness.
Proceedings of the 2014 Workshop on Mobile Augmented Reality and Robotic Technology-Based Systems, 2014

Poster: hearing your breathing: fine-grained sleep monitoring using smartphones.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Smartphone based user verification leveraging gait recognition for mobile healthcare systems.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

2012
Social closeness based clone attack detection for mobile healthcare system.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

2011
Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching.
Proceedings of the Global Communications Conference, 2011

2010
Detecting wormhole attacks in delay-tolerant networks.
IEEE Wirel. Commun., 2010

A social community based approach for reducing the propagation of infectious diseases in healthcare.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010


  Loading...