Jinsong Han

ORCID: 0000-0001-5064-1955
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Indoor and Outdoor Localization Technologies
  • RFID technology advancements
  • User Authentication and Security Systems
  • Energy Harvesting in Wireless Networks
  • Internet Traffic Analysis and Secure E-voting
  • Peer-to-Peer Network Technologies
  • Speech and Audio Processing
  • Gait Recognition and Analysis
  • Privacy-Preserving Technologies in Data
  • Mobile Crowdsensing and Crowdsourcing
  • Biometric Identification and Security
  • Anomaly Detection Techniques and Applications
  • Underwater Vehicles and Communication Systems
  • Wireless Networks and Protocols
  • Energy Efficient Wireless Sensor Networks
  • Advanced Authentication Protocols Security
  • Wireless Signal Modulation Classification
  • Video Surveillance and Tracking Methods
  • Access Control and Trust
  • Context-Aware Activity Recognition Systems
  • Wireless Communication Security Techniques
  • Advanced Malware Detection Techniques
  • Caching and Content Delivery
  • Digital Media Forensic Detection
  • Physical Unclonable Functions (PUFs) and Hardware Security

Zhejiang University of Science and Technology
2019-2025

Zhejiang University
2018-2024

Xi'an Jiaotong University
2010-2024

Peking University Third Hospital
2022-2024

Peking University
2022-2024

General Hospital of Shenyang Military Region
2024

Hebei University of Technology
2023

Alibaba Group (China)
2018-2022

University of Colorado Denver
2022

Heilongjiang Electric Power Workers University
2021

Recent years have witnessed the rapid development in research topic of WiFi sensing that automatically senses human with commercial devices. This work falls into two major categories, i.e., activity recognition and indoor localization. The former utilizes devices to recognize daily activities such as smoking, walking, dancing. latter one, localization, can be used for navigation, location-based services, through-wall surveillance. key rationale behind this type is people behaviors influence...

10.1109/access.2019.2923743 article EN cc-by IEEE Access 2019-01-01

Regular free-weight exercise helps to strengthen the body's natural movements and stabilize muscles that are important strength, balance, posture of human beings. Prior works have exploited wearable sensors or RF signal changes (e.g., WiFi Blue tooth) for activity sensing, recognition countingetc.. However, none them incorporate three key factors necessary a practical monitoring system: recognizing activities on site, assessing their qualities, providing useful feedbacks bodybuilder...

10.1145/2809695.2809708 article EN 2015-11-01

With the rapid development of mobile devices and crowdsourcing platforms, spatial has attracted much attention from database community, specifically, refers to sending a location-based request workers according their positions. In this paper, we consider an important problem, namely reliable diversity-based (RDB-SC), in which tasks (such as taking videos/photos landmark or firework shows, checking whether not parking spaces are available) time-constrained, moving towards some directions. Our...

10.14778/2794367.2794372 article EN Proceedings of the VLDB Endowment 2015-06-01

Gesture recognition has emerged recently as a promising application in our daily lives. Owing to low cost, prevalent availability, and structural simplicity, RFID shall become popular technology for gesture recognition. However, the performance of existing RFID-based systems is constrained by unfavorable intrusiveness users, requiring users attach tags on their bodies. To overcome this, we propose GRfid, novel device-free system based phase information output COTS devices. Our work stems...

10.1109/tmc.2016.2549518 article EN IEEE Transactions on Mobile Computing 2016-03-31

Fine-grained person perception such as body segmentation and pose estimation has been achieved with many 2D 3D sensors RGB/depth cameras, radars (e.g. RF-Pose), LiDARs. These solutions require images, depth maps or point clouds of bodies input. In this paper, we take one step forward to show that fine-grained is possible even 1D sensors: WiFi antennas. Specifically, used two sets antennas acquire signals, i.e., transmitter set receiver set. Each contains three horizontally lined-up a regular...

10.1109/iccv.2019.00555 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2019-10-01

Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Effectively monitoring large field by analyzing images from multiple cameras remains challenging issue. Other approaches generally require the tracking objects to attach special devices, which are infeasible scenarios. To address issue, we propose use RF tag arrays for activity where data mining techniques play critical role. The RFID technology provides an economically attractive...

10.1109/tpds.2011.307 article EN IEEE Transactions on Parallel and Distributed Systems 2011-12-20

Device-free object tracking provides a promising solution for many localization and systems to monitor non-cooperative objects, such as intruders, which do not carry any transceiver. However, existing device-free solutions mainly use special sensors or active RFID tags, are much more expensive compared passive tags. In this paper, we propose novel motion detection method using named Twins. The leverages newly observed phenomenon called critical state caused by interference among We...

10.1109/tnet.2015.2429657 article EN IEEE/ACM Transactions on Networking 2015-05-25

With the rapid development of mobile devices and crowdsourcing platforms, spatial has attracted much attention from database community. Specifically, refers to sending location-based requests workers, based on their current positions. In this paper, we consider a scenario, in which each worker set qualified skills, whereas task (e.g., repairing house, decorating room, performing entertainment shows for ceremony) is time-constrained, under budget constraint, required skills. Under will study...

10.1109/tkde.2016.2550041 article EN IEEE Transactions on Knowledge and Data Engineering 2016-04-04

Physical-layer identification utilizes unique features of wireless devices as their fingerprints, providing authenticity and security guarantee. Prior physical-layer techniques on radio frequency (RFID) tags require nongeneric equipments are not fully compatible with existing standards. In this paper, we propose a novel system, GenePrint, for UHF passive tags. The GenePrint prototype system is implemented by commercial reader, USRP-based monitor, off-the-shelf Our solution generic completely...

10.1109/tnet.2015.2391300 article EN IEEE/ACM Transactions on Networking 2015-02-03

Device-to-device communication is important to emerging mobile applications such as Internet of Things and social networks. Authentication key agreement among multiple legitimate devices the first step build a secure channel. Existing solutions put into physical proximity use common radio environment proof identities secret agree on same key. However they experience very slow bit generation rate high errors, requiring several minutes 256-bit In this work, we design implement an...

10.1145/2976749.2978298 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2016-10-24

WiFi-based Human Gesture Recognition (HGR) becomes increasingly promising for device-free human-computer interaction. However, existing approaches have not been ready real-world deployment due to the limited scalability, especially unseen gestures. The reason behind is that when introducing gestures, prior works collect a large number of samples and re-train model. While recent advance few-shot learning has brought new opportunities solve this problem, overhead effectively reduced. This...

10.1145/3485730.3485936 article EN 2021-11-11

With the advance in automatic speech recognition, voice user interface has gained popularity recently. Since COVID-19 pandemic, VUI is increasingly preferred online communication due to its non-contact. Additionally, various ambient noise impedes public applications of interfaces requirement audio-only recognition methods for a high signal-to-noise ratio. In this paper, we present Wavoice, first noise-resistant multi-modal system that fuses two distinct sensing modalities, i.e.,...

10.1145/3485730.3485945 article EN 2021-11-11

The objective of private authentication for radio frequency identification (RFID) systems is to allow valid readers explicitly authenticate their dominated tags without leaking tags' information. To achieve this goal, RFID issue encrypted messages the reader, and reader searches key space locate tags. Due lack efficient updating algorithms, previous schemes are vulnerable many active attacks, especially compromising attack. In paper, we propose a strong lightweight protocol, SPA. By...

10.1109/percom.2007.13 article EN 2007-03-01

Cardinality estimation and tag authentication are two major issues in large-scale Radio Frequency Identification (RFID) systems. While there exist both per-tag probabilistic approaches for the cardinality estimation, RFID-oriented protocols mainly based: reader authenticates one at each time. For a batch of tags, current RFID systems have to identify them then authenticate sequentially, incurring large volume data huge communication cost. We study issue propose first approach, termed as...

10.1109/icnp.2010.5762764 article EN 2010-10-01

Prior work on anti-collision for Radio Frequency IDentification (RFID) systems usually schedule adjacent readers to exclusively interrogate tags avoiding reader collisions. Although such a pattern can effectively deal with collisions, the lack of readers' collaboration wastes numerous time scheduling process and dramatically degrades throughput identification. Even worse, within overlapped interrogation regions (termed as contentious tags), even if number is very small, introduce significant...

10.1109/infcom.2011.5935154 article EN 2011-04-01

Shopping behavior data are of great importance to understand the effectiveness marketing and merchandising efforts. Online clothing stores capable capturing customer shopping by analyzing click stream carts. Retailers with physical stores, however, still lack effective methods identify comprehensive behaviors. In this paper, we show that backscatter signals passive RFID tags can be exploited detect record how customers browse which items clothes they pay attention to, usually match with. The...

10.1145/2809695.2809710 article EN 2015-11-01

Comparing to well protected data frames, Wi-Fi management frames (MFs) are extremely vulnerable various attacks. Since MFs transmitted without encryption or authentication, attackers can easily launch attacks by forging the MFs. In a collaborative environment with many sniffers, such be detected sensing anomaly RSS changes. However, it is quite difficult identify these spoofing assistance from other nodes. By exploiting some unique characteristics (e.g., rapid spatial decorrelation,...

10.1109/infcom.2013.6567061 preprint EN 2013-04-01

Different from online shopping, in-store shopping has few ways to collect the customer behaviors before purchase. In this paper, we present design and implementation of an on-site Customer Behavior IDentification system based on passive RFID tags, named CBID. By collecting analyzing wireless signal features, CBID can detect track tag movements further infer corresponding behaviors. We model three main objectives behavior identification by concrete problems solve them using novel protocols...

10.1109/tnet.2015.2501103 article EN IEEE/ACM Transactions on Networking 2015-12-02

Device to device (D2D) communication is expected become a promising technology of the next-generation wireless systems. Security issues have technical barriers D2D due its "open-air" nature and lack centralized control. Generating symmetric keys individually on different parties without key exchange or distribution desirable but challenging. Recent work has proposed extract from measurement physical layer random variations channel, e.g., channel state information (CSI) orthogonal...

10.1109/iwqos.2014.6914340 article EN 2014-05-01

Device-free based object tracking provides a promising solution for many localization and systems to monitor non-cooperative objects which do not carry any transceiver such as intruders. However, existing device-free solutions mainly use sensors active RFID tags, are much more expensive compared passive tags. In this paper, we propose novel motion detection method using named Twins. The leverages phenomenon called critical state caused by interference among We theoretically explain via an...

10.1109/infocom.2014.6847970 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

This paper presents RF-Mehndi, a passive commercial RFID tag array formed identifier. The key RF-Mehndi novelty is that when the user's fingertip touching on surface during communication, backscattered signals by become user-dependent and unique. Hence, if we enhance communication modality of many personal cards nowadays in case card gets lost or stolen, it cannot be used illegally adversaries. To harvest such benefit, have two observations designing RF-Mehndi. first observation tags are...

10.1109/infocom.2019.8737419 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

Regular free-weight exercise helps to strengthen natural movements and stabilize muscles that are important strength, balance, posture of human beings. Prior works have exploited wearable sensors or RF signal changes for activity sensing, recognition, counting, etc.. However, none them incorporated three key factors necessary a practical monitoring system: recognizing activities on site, assessing their qualities, providing useful feedbacks the bodybuilder promptly. Our FEMO system provides...

10.1109/tmc.2017.2691705 article EN IEEE Transactions on Mobile Computing 2017-04-06

The technological revolution of long-awaited energy-saving and vision-friendly displays represented by bistable display technology is coming. Here we discuss methods, challenges, opportunities for implementing in terms molecular design, device structure, further expansion, required criteria, hopefully benefiting the light-related community.

10.1038/s41377-020-00455-9 article EN cc-by Light Science & Applications 2021-02-07

Face authentication (FA) schemes are universally adopted. However, current FA systems mainly camera-based and hence susceptible to face occlusion (e.g., facial masks) vulnerable spoofing attacks 3D-printed masks). This paper exploits the penetrability, material sensitivity, fine-grained sensing capability of millimeter wave (mmWave) build an anti-spoofing system, named mmFace. It scans human by moving a commodity off-the-shelf (COTS) mmWave radar along specific trajectory. The signals...

10.1145/3495243.3560515 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2022-10-14

Screen locking/unlocking is important for modern smart phones to avoid the unintentional operations and secure personal stuff. Once phone locked, user should take a specific action or provide some secret information unlock phone. The existing unlocking approaches can be categorized into four groups: motion, password, pattern, fingerprint. Existing do not support well due deficiency of security, high cost, poor usability. We collect 200 users' handwaving actions with their discover an...

10.1109/tmc.2014.2341633 article EN IEEE Transactions on Mobile Computing 2014-07-22
Coming Soon ...