Yingying Chen

Orcid: 0000-0002-3994-766X

Affiliations:
  • Rutgers University, Department of Electrical and Computer Engineering, New Brunswick, NJ, USA
  • Stevens Institute of Technology, Department of Electrical and Computer Engineering, Hoboken, NJ, USA (former)


According to our database1, Yingying Chen authored at least 323 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

ACM Fellow

ACM Fellow 2023, "For contributions to the design and application of mobile sensing and mobile security systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secret Key Generation Based on Manipulated Channel Measurement Matching.
IEEE Trans. Mob. Comput., October, 2024

MoiréTracker: Continuous Camera-to-Screen 6-DoF Pose Tracking Based on Moiré Pattern.
IEEE J. Sel. Areas Commun., October, 2024

Robust Indoor Location Identification for Smartphones Using Echoes From Dominant Reflectors.
IEEE Trans. Mob. Comput., May, 2024

PPG-Hear: A Practical Eavesdropping Attack with Photoplethysmography Sensors.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., May, 2024

Secure Mobile Two-Factor Authentication Leveraging Active Sound Sensing.
IEEE Trans. Mob. Comput., February, 2024

FewSense, Towards a Scalable and Cross-Domain Wi-Fi Sensing System Using Few-Shot Learning.
IEEE Trans. Mob. Comput., January, 2024

Mobile Technologies for Smart Healthcare System Design
Wireless Networks, Springer, ISBN: 978-3-031-57344-6, 2024

DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models.
CoRR, 2024

TouchTone: Smartwatch Privacy Protection via Unobtrusive Finger Touch Gestures.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024

RFSpy: Eavesdropping on Online Conversations with Out-of-Vocabulary Words by Sensing Metal Coil Vibration of Headsets Leveraging RFID.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024

Inaudible Backdoor Attack via Stealthy Frequency Trigger Injection in Audio Spectrogram.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

Practical Adversarial Attack on WiFi Sensing Through Unnoticeable Communication Packet Perturbation.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

Palm-Based User Authentication Through mmWave.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

mmHand: 3D Hand Pose Estimation Leveraging mmWave Signals.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

2023
Toward Multi-User Authentication Using WiFi Signals.
IEEE/ACM Trans. Netw., October, 2023

A Phoneme Localization Based Liveness Detection for Text-Independent Speaker Verification.
IEEE Trans. Mob. Comput., October, 2023

H2K: A Heartbeat-Based Key Generation Framework for ECG and PPG Signals.
IEEE Trans. Mob. Comput., 2023

VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023

BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Person Re-identification in 3D Space: A WiFi Vision-based Approach.
Proceedings of the 32nd USENIX Security Symposium, 2023

Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Passive Vital Sign Monitoring via Facial Vibrations Leveraging AR/VR Headsets.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

BioCase: Privacy Protection via Acoustic Sensing of Finger Touches on Smartphone Case Mini-Structures.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

mm3DFace: Nonintrusive 3D Facial Reconstruction Leveraging mmWave Signals.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

EarCase: Sound Source Localization Leveraging Mini Acoustic Structure Equipped Phone Cases for Hearing-challenged People.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Poster: Extracting Speech from Subtle Room Object Vibrations Using Remote mmWave Sensing.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

DynGMP: Graph Neural Network-Based Motion Planning in Unpredictable Dynamic Environments.
IROS, 2023

Universal Targeted Adversarial Attacks Against mmWave-based Human Activity Recognition.
Proceedings of the IEEE INFOCOM 2023, 2023

Secure and Robust Two Factor Authentication via Acoustic Fingerprinting.
Proceedings of the IEEE INFOCOM 2023, 2023

P<sup>2</sup>Auth: Two-Factor Authentication Leveraging PIN and Keystroke-Induced PPG Measurements.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

EchoImage: User Authentication on Smart Speakers Using Acoustic Signals.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

EmoLeak: Smartphone Motions Reveal Emotions.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Stealthy Backdoor Attack on RF Signal Classification.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Privacy Leakage via Speech-induced Vibrations on Room Objects through Remote Sensing based on Phased-MIMO.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Secure and Efficient Mobile DNN Using Trusted Execution Environments.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices.
IEEE Trans. Mob. Comput., 2022

Leveraging Acoustic Signals for Fine-Grained Breathing Monitoring in Driving Environments.
IEEE Trans. Mob. Comput., 2022

Enabling Fine-Grained Finger Gesture Recognition on Commodity WiFi Devices.
IEEE Trans. Mob. Comput., 2022

Enabling Secret Key Distribution Over Screen-to-Camera Channel Leveraging Color Shift Property.
IEEE Trans. Mob. Comput., 2022

A Survey of Deep Learning on Mobile Devices: Applications, Optimizations, Challenges, and Research Opportunities.
Proc. IEEE, 2022

Women in Networks: Dr. Lili Qiu.
IEEE Netw., 2022

Women in Networks: Professor Cecilia Mascolo.
IEEE Netw., 2022

Robust Continuous Authentication Using Cardiac Biometrics From Wrist-Worn Wearables.
IEEE Internet Things J., 2022

A Continuous Articulatory-Gesture-Based Liveness Detection for Voice Authentication on Smart Devices.
IEEE Internet Things J., 2022

A Review of IoT-Enabled Mobile Healthcare: Technologies, Challenges, and Future Trends.
IEEE Internet Things J., 2022

Commodity WiFi Sensing in Ten Years: Status, Challenges, and Opportunities.
IEEE Internet Things J., 2022

Acoustic-Sensing-Based Location Semantics Identification Using Smartphones.
IEEE Internet Things J., 2022

ToothSonic: Earable Authentication via Acoustic Toothprint.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

GoPose: 3D Human Pose Estimation Using WiFi.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers.
CoRR, 2022

Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples.
CoRR, 2022

Wi-Mesh: A WiFi Vision-Based Approach for 3D Human Mesh Construction.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Solving the WiFi Sensing Dilemma in Reality Leveraging Conformal Prediction.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

A Vision-Based Approach for Commodity WiFi Sensing.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Personalized health monitoring via vital sign measurements leveraging motion sensors on AR/VR headsets.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Universal targeted attacks against mmWave-based human activity recognition system.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

m<sup>3</sup>Track: mmwave-based multi-user 3D posture tracking.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Speech privacy attack via vibrations from room objects leveraging a phased-MIMO radar.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Continuous blood pressure monitoring using low-cost motion sensors on AR/VR headsets.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

BioTag: robust RFID-based continuous user verification using physiological features from respiration.
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022

A wifi vision-based 3D human mesh reconstruction.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Person re-identification using wifi signals.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

MoiréPose: ultra high precision camera-to-screen pose estimation based on Moiré pattern.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

A non-intrusive and adaptive speaker de-identification scheme using adversarial examples.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Audio-domain position-independent backdoor attack via unnoticeable triggers.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

mmECG: Monitoring Human Cardiac Cycle in Driving Environments Leveraging Millimeter Wave.
Proceedings of the IEEE INFOCOM 2022, 2022

OnionCode: Enabling Multi-priority Coding in LED-based Optical Camera Communications.
Proceedings of the IEEE INFOCOM 2022, 2022

Push the Limit of WiFi-based User Authentication towards Undefined Gestures.
Proceedings of the IEEE INFOCOM 2022, 2022

An Improved Least-square based Jammer Localization Algorithm.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

mmFit: Low-Effort Personalized Fitness Monitoring Using Millimeter Wave.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Invisible and Efficient Backdoor Attacks for Compressed Deep Neural Networks.
Proceedings of the IEEE International Conference on Acoustics, 2022

Excerpt of ToothSonic: Earable Authentication via Acoustic Toothprint.
Proceedings of the Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers, 2022

RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN.
Proceedings of the Computer Vision - ECCV 2022, 2022

Poster: Fingerprint-Face Friction Based Earable Authentication.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: A WiFi Vision-based Approach to Person Re-identification.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Real-time, Robust and Adaptive Universal Adversarial Attacks Against Speaker Recognition Systems.
J. Signal Process. Syst., 2021

Localizing Acoustic Objects on a Single Phone.
IEEE/ACM Trans. Netw., 2021

Towards Low-Cost Sign Language Gesture Recognition Leveraging Wearables.
IEEE Trans. Mob. Comput., 2021

An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing.
IEEE Trans. Mob. Comput., 2021

Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi.
IEEE Trans. Mob. Comput., 2021

WiFi-Enabled User Authentication through Deep Learning in Daily Activities.
ACM Trans. Internet Things, 2021

Dr. Wenjing Lou, Virginia Tech, USA.
IEEE Netw., 2021

Women in Networks: Dr. Carla Fabiana Chiasserini, Politecnico di Torino, Italy.
IEEE Netw., 2021

VLC-based Data Transfer and Energy Harvesting Mobile System.
J. Ubiquitous Syst. Pervasive Networks, 2021

Thru-the-wall Eavesdropping on Loudspeakers via RFID by Capturing Sub-mm Level Vibration.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Winect: 3D Human Pose Tracking for Free-form Activity Using Commodity WiFi.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Authentication of Voice Commands by Leveraging Vibrations in Wearables.
IEEE Secur. Priv., 2021

Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals.
Comput. J., 2021

Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

3D Human Pose Estimation Using WiFi Signals.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

Secure Coded Computation for Efficient Distributed Learning in Mobile IoT.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021

MultiAuth: Enable Multi-User Authentication with Single Commodity WiFi Device.
Proceedings of the MobiHoc '21: The Twenty-second International Symposium on Theory, 2021

Tracking free-form activity using wifi signals.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Environment-independent In-baggage Object Identification Using WiFi Signals.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Bipartite Graph Matching Based Secret Key Generation.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

MIXP: Efficient Deep Neural Networks Pruning for Further FLOPs Compression via Neuron Bond.
Proceedings of the International Joint Conference on Neural Networks, 2021

Breathing Sound-based Exercise Intensity Monitoring via Smartphones.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Earable Authentication via Acoustic Toothprint.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Enabling Fast and Universal Audio Adversarial Attack Using Generative Model.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Reference Waveforms Forward Concurrent Transmissions in ZigBee Communications.
IEEE/ACM Trans. Netw., 2020

Leveraging Acoustic Signals for Vehicle Steering Tracking with Smartphones.
IEEE Trans. Mob. Comput., 2020

Probing into the Physical Layer: Moving Tag Detection for Large-Scale RFID Systems.
IEEE Trans. Mob. Comput., 2020

Signature Verification Using Critical Segments for Securing Mobile Transactions.
IEEE Trans. Mob. Comput., 2020

VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity.
CoRR, 2020

EchoLock: Towards Low Effort Mobile User Identification.
CoRR, 2020

Wireless Sensing for Human Activity: A Survey.
IEEE Commun. Surv. Tutorials, 2020

User authentication on mobile devices: Approaches, threats and trends.
Comput. Networks, 2020

Acoustic-based sensing and applications: A survey.
Comput. Networks, 2020

Practical Adversarial Attacks Against Speaker Recognition Systems.
Proceedings of the HotMobile '20: The 21st International Workshop on Mobile Computing Systems and Applications, 2020

BatComm: enabling inaudible acoustic communication with high-throughput for mobile devices.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

TouchPass: towards behavior-irrelevant on-touch user authentication on smartphones leveraging vibrations.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

Towards Environment-independent Behavior-based User Authentication Using WiFi.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

TrueHeart: Continuous Authentication on Wrist-worn Wearables Using PPG-based Biometrics.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

MU-ID: Multi-user Identification Through Gaits Using Millimeter Wave Radios.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

LiveScreen: Video Chat Liveness Detection Leveraging Skin Reflection.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Continuous User Verification via Respiratory Biometrics.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi Signals.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Driver Identification Leveraging Single-turn Behaviors via Mobile Devices.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Real-Time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Mobile Light Storage: Make the Light Smarter.
Proceedings of the 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2020) / The 15th International Conference on Future Networks and Communications (FNC-2020) / The 10th International Conference on Sustainable Energy Information Technology, 2020

EchoLock: Towards Low-effort Mobile User Identification Leveraging Structure-borne Echos.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

AdvPulse: Universal, Synchronization-free, and Targeted Audio Adversarial Attacks via Subsecond Perturbations.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones.
IEEE/ACM Trans. Netw., 2019

A Smartphone-Only Pulse Transit Time Monitor Based on Cardio-Mechanical and Photoplethysmography Modalities.
IEEE Trans. Biomed. Circuits Syst., 2019

Implications of smartphone user privacy leakage from the advertiser's perspective.
Pervasive Mob. Comput., 2019

Noninvasive Fine-Grained Sleep Monitoring Leveraging Smartphones.
IEEE Internet Things J., 2019

I3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers.
CoRR, 2019

BreathListener: Fine-grained Breathing Monitoring in Driving Environments Utilizing Acoustic Signals.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019

Demo: Toward Continuous User Authentication Using PPG in Commodity Wrist-worn Wearables.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Poster: Video Chat Scam Detection Leveraging Screen Light Reflection.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Poster: Inaudible High-throughput Communication Through Acoustic Signals.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Forward the Collision Decomposition in ZigBee.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

HyperEar: Indoor Remote Object Finding with a Single Phone.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Wi-Fi-Enabled Automatic Eating Moment Monitoring Using Smartphones.
Proceedings of the IoT Technologies for HealthCare - 6th EAI International Conference, 2019

Semi-black-box Attacks Against Speech Recognition Systems Using Adversarial Samples.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

Demo: Hands-Free Human Activity Recognition Using Millimeter-Wave Sensors.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

Demo: Monitoring Movement Dynamics of Robot Cars and Drones Using Smartphone's Built-in Sensors.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

Demo: Device-free Activity Monitoring Through Real-time Analysis on Prevalent WiFi Signals.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Sensing Vehicle Conditions for Detecting Driving Behaviors
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-319-89769-1, 2018

Leveraging Audio Signals for Early Recognition of Inattentive Driving with Smartphones.
IEEE Trans. Mob. Comput., 2018

Personal PIN Leakage from Wearable Devices.
IEEE Trans. Mob. Comput., 2018

Authenticating Users Through Fine-Grained Channel Information.
IEEE Trans. Mob. Comput., 2018

Robot-assisted smartphone localization for human indoor tracking.
Robotics Auton. Syst., 2018

Monitoring Vital Signs and Postures During Sleep Using WiFi Signals.
IEEE Internet Things J., 2018

RF-ECG: Heart Rate Variability Assessment Based on COTS RFID Tag Array.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

RF-Kinect: A Wearable RFID-based Approach Towards 3D Body Movement Tracking.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Device-free Personalized Fitness Assistant Using WiFi.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Behavior Recognition Based on Wi-Fi CSI: Part 2.
IEEE Commun. Mag., 2018

SteerTrack: Acoustic-Based Device-Free Steering Tracking Leveraging Smartphones.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Your Heart Won't Lie: PPG-based Continuous Authentication on Wrist-worn Wearable Devices.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Poster: Inferring Mobile Payment Passcodes Leveraging Wearable Devices.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Poster: Your Phone Tells Us The Truth: Driver Identification Using Smartphone on One Turn.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Poster: Leveraging Breathing for Continuous User Authentication.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Session details: Keynote Address II.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

PPG-based Finger-level Gesture Recognition Leveraging Wearables.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Multi - Touch in the Air: Device-Free Finger Tracking and Gesture Recognition via COTS RFID.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

A Low-cost, Smartphone-only Pulse Transit Time Measurement System Using Cardio-mechanical Signals and Optical Sensors.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

Towards In-baggage Suspicious Object Detection Using Commodity WiFi.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Fine-Grained Abnormal Driving Behaviors Detection and Identification with Smartphones.
IEEE Trans. Mob. Comput., 2017

Color Scheme Adaptation to Enhance User Experience on Smartphone Displays Leveraging Ambient Light.
IEEE Trans. Mob. Comput., 2017

Locating Rogue Access Point Using Fine-Grained Channel Information.
IEEE Trans. Mob. Comput., 2017

Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching.
IEEE Trans. Dependable Secur. Comput., 2017

Signal Processing for Smart Vehicle Technologies: Part 2 [From the Guest Editors].
IEEE Signal Process. Mag., 2017

Behavior Recognition Based on Wi-Fi CSI: Part 1.
IEEE Commun. Mag., 2017

WiFi-Enabled Smart Human Dynamics Monitoring.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

VibSense: Sensing Touches on Ubiquitous Surfaces through Vibration.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

BigRoad: Scaling Road Data Acquisition for Dependable Self-Driving.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

SubTrack: Enabling Real-Time Tracking of Subway Riding on Mobile Devices.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

SalsaAsst: Beat Counting System Empowered by Mobile Devices to Assist Salsa Dancers.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

ER: Early recognition of inattentive driving leveraging audio devices on smartphones.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

FitCoach: Virtual fitness coach empowered by wearable mobile devices.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Secret key distribution leveraging color shift over visible light channel.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors.
IEEE Trans. Mob. Comput., 2016

Profit Maximization through Online Advertising Scheduling for a Wireless Video Broadcast Network.
IEEE Trans. Mob. Comput., 2016

Signal Processing for Smart Vehicle Technologies [From the Guest Editors].
IEEE Signal Process. Mag., 2016

PIN number-based authentication leveraging physical vibration: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

VibKeyboard: virtual keyboard leveraging physical vibration: demo.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Sensing on ubiquitous surfaces via vibration signals: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Towards safer texting while driving through stop time prediction.
Proceedings of the First ACM International Workshop on Smart, 2016

HearHere: smartphone based audio localization using time difference of arrival: demo.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Automatic personal fitness assistance through wearable mobile devices: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Leveraging wearables for steering and driver tracking.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Uber-in-light: Unobtrusive visible light communication leveraging complementary color channel.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Motion Scale: A Body Motion Monitoring System Using Bed-Mounted Wireless Load Cells.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS).
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Distributed Consensus-Based Weight Design for Cooperative Spectrum Sensing.
IEEE Trans. Parallel Distributed Syst., 2015

Protecting Multi-Lateral Localization Privacy in Pervasive Environments.
IEEE/ACM Trans. Netw., 2015

An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization.
IEEE Trans. Mob. Comput., 2015

Sensing Human-Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones.
IEEE Trans. Mob. Comput., 2015

User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems.
IEEE Trans. Mob. Comput., 2015

A Low-Cost Wi-Fi-Based Solution for Measuring Human Queues.
GetMobile Mob. Comput. Commun., 2015

SECO: Secure and scalable data collaboration services in cloud computing.
Comput. Secur., 2015

Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones.
Ad Hoc Sens. Wirel. Networks, 2015

Sensing Ambient Light for User Experience-Oriented Color Scheme Adaptation on Smartphone Displays.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

D<sup>3</sup>: Abnormal driving behaviors detection and identification using smartphone sensors.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Toward Detection of Unsafe Driving with Wearables.
Proceedings of the 2015 workshop on Wearable Systems and Applications, 2015

Video: LookUp!: Enabling Pedestrian Safety Services via Shoe Sensing.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

LookUp: Enabling Pedestrian Safety Services via Shoe Sensing.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Snooping Keystrokes with mm-level Audio Ranging on a Single Phone.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Fine-grained sleep monitoring: Hearing your breathing with smartphones.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Towards Understanding the Advertiser's Perspective of Smartphone User Privacy.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Critical segment based real-time E-signature for securing mobile transactions.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Pervasive Wireless Environments: Detecting and Localizing User Spoofing
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-07356-9, 2014

Incentive Based Data Sharing in Delay Tolerant Mobile Networks.
IEEE Trans. Wirel. Commun., 2014

A Study of Localization Accuracy Using Multiple Frequencies and Powers.
IEEE Trans. Parallel Distributed Syst., 2014

An Error-Minimizing Framework for Localizing Jammers in Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks.
ACM Trans. Sens. Networks, 2014

Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation.
IEEE Trans. Mob. Comput., 2014

Accurate WiFi Based Localization for Smartphones Using Peer Assistance.
IEEE Trans. Mob. Comput., 2014

Robust Spectrum Sensing With Crowd Sensors.
IEEE Trans. Commun., 2014

Leveraging Wi-Fi Signals to Monitor Human Queues.
IEEE Pervasive Comput., 2014

Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing.
Comput. Secur., 2014

Accelerating 5G QoE via public-private spectrum sharing.
IEEE Commun. Mag., 2014

Tracking human queues using single-point signal monitoring.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

On the limits of positioning-based pedestrian risk awareness.
Proceedings of the 2014 Workshop on Mobile Augmented Reality and Robotic Technology-Based Systems, 2014

E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Poster: hearing your breathing: fine-grained sleep monitoring using smartphones.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Robot-assisted human indoor localization using the Kinect sensor and smartphones.
Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2014

Multi-lateral privacy-preserving localization in pervasive environments.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environments.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing.
Proceedings of the IEEE Global Communications Conference, 2014

Accurate rogue access point localization leveraging fine-grained channel information.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Practical user authentication leveraging channel state information (CSI).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Detection of On-Road Vehicles Emanating GPS Interference.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Neighborhood prediction based decentralized key management for mobile wireless networks.
Wirel. Networks, 2013

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Kernel-Based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions.
IEEE Signal Process. Mag., 2013

E<sup>3</sup>: energy-efficient engine for frame rate adaptation on smartphones.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

Smartphone based user verification leveraging gait recognition for mobile healthcare systems.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Sensing vehicle dynamics for determining driver phone use.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Measuring human queues using WiFi signals.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

Achieving secure and efficient data collaboration in cloud computing.
Proceedings of the 21st IEEE/ACM International Symposium on Quality of Service, 2013

Proactive call drop avoidance in UMTS networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Adaptive device-free passive localization coping with dynamic target speed.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Fast and practical secret key extraction by exploiting channel response.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

P2E: Privacy-preserving and effective cloud data sharing service.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Towards self-healing smart grid via intelligent local controller switching under jamming.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Achieving robust wireless localization resilient to signal strength attacks.
Wirel. Networks, 2012

Exploiting Jamming-Caused Neighbor Changes for Jammer Localization.
IEEE Trans. Parallel Distributed Syst., 2012

Sensing Driver Phone Use with Acoustic Ranging through Car Speakers.
IEEE Trans. Mob. Comput., 2012

Toward attack-resistant localization under infrastructure attacks.
Secur. Commun. Networks, 2012

Detecting anomalous spectrum usage in dynamic spectrum access networks.
Ad Hoc Networks, 2012

Securing Mobile Location-based Services through position verification leveraging key distribution.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Extracting jamming signals to locate radio interferers and jammers.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Push the limit of WiFi based localization for smartphones.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Social closeness based clone attack detection for mobile healthcare system.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Error minimizing jammer localization through smart estimation of ambient noise.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Incentive driven information sharing in delay tolerant mobile networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks.
Wirel. Networks, 2011

Determining the position of a jammer using a virtual-force iterative approach.
Wirel. Networks, 2011

Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments.
Ad Hoc Sens. Wirel. Networks, 2011

Tracking vehicular speed variations by warping mobile phone signal strengths.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Detecting driver phone use leveraging car speakers.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Designing localization algorithms robust to signal strength attacks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Localizing Multiple Jamming Attackers in Wireless Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Distributed Cooperative Spectrum Sensing Based on Weighted Average Consensus.
Proceedings of the Global Communications Conference, 2011

Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching.
Proceedings of the Global Communications Conference, 2011

2010
Detecting wormhole attacks in delay-tolerant networks.
IEEE Wirel. Commun., 2010

Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks.
IEEE Trans. Veh. Technol., 2010

Empirical Evaluation of Wireless Localization when Using Multiple Antennas.
IEEE Trans. Parallel Distributed Syst., 2010

Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications.
IEEE Trans. Parallel Distributed Syst., 2010

A social community based approach for reducing the propagation of infectious diseases in healthcare.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2010

Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Mobile Sensing Enabled Robust Detection of Security Threats in Urban Environments.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

A decentralized key management scheme via neighborhood prediction in mobile wireless networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Characterizing the impact of multi-frequency and multi-power on localization accuracy.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Accuracy characterization of cell tower localization.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Vehicular speed estimation using received signal strength from mobile phones.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010

Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges.
Proceedings of the Distributed Computing in Sensor Systems, 2010

2009
A security and robustness performance analysis of localization algorithms to signal strength attacks.
ACM Trans. Sens. Networks, 2009

DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices.
IEEE Trans. Mob. Comput., 2009

Detecting Spoofing Attacks in Mobile Wireless Environments.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Empirical Evaluation of the Limits on Localization Using Signal Strength.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Localizing Jammers in Wireless Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Indoor Localization Using Improved RSS-Based Lateration Methods.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Securing Emerging Wireless Systems - Lower-layer Approaches.
Springer, ISBN: 978-0-387-88490-5, 2009

2008
Exploiting environmental properties for wireless localization.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008

The concept of decentralized and secure electronic marketplace.
Electron. Commer. Res., 2008

The Impact of Using Multiple Antennas on Wireless Localization.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Exploiting Environmental Properties for Wireless Localization and Location Aware Applications.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Detecting sybil attacks inwireless and sensor networks using cluster analysis.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

DECODE : Detecting co-moving wireless devices.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

A theoretical analysis of wireless localization using RF-based fingerprint matching.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

2007
Detecting and Localizing Wireless Spoofing Attacks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

ADLS: Attack Detection for Wireless Localization Using Least Squares.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Attack Detection in Wireless Localization.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
GRAIL: general real-time adaptable indoor localization.
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, 2006

A Practical Approach to Landmark Deployment for Indoor Localization.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study.
Proceedings of the Distributed Computing in Sensor Systems, 2006


  Loading...