Wei Xi

ORCID: 0000-0001-9348-2982
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Indoor and Outdoor Localization Technologies
  • RFID technology advancements
  • Underwater Vehicles and Communication Systems
  • Speech and Audio Processing
  • Advanced MIMO Systems Optimization
  • Mobile Crowdsensing and Crowdsourcing
  • Wireless Networks and Protocols
  • Energy Efficient Wireless Sensor Networks
  • Privacy-Preserving Technologies in Data
  • Energy Harvesting in Wireless Networks
  • Speech Recognition and Synthesis
  • Cooperative Communication and Network Coding
  • Music and Audio Processing
  • Bluetooth and Wireless Communication Technologies
  • Context-Aware Activity Recognition Systems
  • Wireless Communication Security Techniques
  • Robotics and Sensor-Based Localization
  • Internet Traffic Analysis and Secure E-voting
  • Millimeter-Wave Propagation and Modeling
  • Security in Wireless Sensor Networks
  • Advanced Wireless Network Optimization
  • User Authentication and Security Systems
  • Gait Recognition and Analysis
  • Fault Detection and Control Systems
  • Video Surveillance and Tracking Methods

Xi'an Jiaotong University
2016-2025

Jining Medical University
2024

Shanghai Library
2024

Tianjin Medical University Cancer Institute and Hospital
2023

Chang'an University
2018

Fujitsu (China)
2016

University of Hong Kong
2010-2012

Hong Kong University of Science and Technology
2010-2012

Beijing University of Posts and Telecommunications
2006-2010

Indoor localization is of great importance for a range pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require process site survey, which radio signatures are collected and stored further comparison matching. Site survey involves intensive costs on manpower time. In this work, we study unexploited RF signal characteristics leverage user motions to construct floor plan that previously obtained by survey. On basis, design WILL, an...

10.1109/tpds.2012.179 article EN IEEE Transactions on Parallel and Distributed Systems 2012-06-12

Crowd counting, which count or accurately estimate the number of human beings within a region, is critical in many applications, such as guided tour, crowd control and marketing research analysis. A counting solution should be scalable minimally intrusive (i.e., device-free) to users. Image-based solutions are device-free, but cannot work well dim dark environment. Non-image based usually require every being carrying device, inaccurate unreliable practice. In this paper, we present FCC,...

10.1109/infocom.2014.6847958 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

Regular free-weight exercise helps to strengthen the body's natural movements and stabilize muscles that are important strength, balance, posture of human beings. Prior works have exploited wearable sensors or RF signal changes (e.g., WiFi Blue tooth) for activity sensing, recognition countingetc.. However, none them incorporate three key factors necessary a practical monitoring system: recognizing activities on site, assessing their qualities, providing useful feedbacks bodybuilder...

10.1145/2809695.2809708 article EN 2015-11-01

Device-free object tracking provides a promising solution for many localization and systems to monitor non-cooperative objects, such as intruders, which do not carry any transceiver. However, existing device-free solutions mainly use special sensors or active RFID tags, are much more expensive compared passive tags. In this paper, we propose novel motion detection method using named Twins. The leverages newly observed phenomenon called critical state caused by interference among We...

10.1109/tnet.2015.2429657 article EN IEEE/ACM Transactions on Networking 2015-05-25

Indoor localization is of great importance for a range pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require process site survey, which radio signatures are collected and stored further comparison matching. Site survey involves intensive costs on manpower time. In this work, we study unexploited RF signal characteristics leverage user motions to construct floor plan that previously obtained by survey. On basis, design WILL, an...

10.1109/infcom.2012.6195809 article EN 2012-03-01

Localization is a fundamental issue of wireless sensor networks that has been extensively studied in the literature. Our real-world experience from GreenOrbs, network system deployed forest, shows localization wild remains very challenging due to various interfering factors. In this paper, we propose CDL, Combined and Differentiated approach for exploits strength range-free approaches range-based using received signal indicator (RSSI). A critical observation ranging quality greatly impacts...

10.1109/tnet.2012.2200906 article EN IEEE/ACM Transactions on Networking 2012-06-12

Physical-layer identification utilizes unique features of wireless devices as their fingerprints, providing authenticity and security guarantee. Prior physical-layer techniques on radio frequency (RFID) tags require nongeneric equipments are not fully compatible with existing standards. In this paper, we propose a novel system, GenePrint, for UHF passive tags. The GenePrint prototype system is implemented by commercial reader, USRP-based monitor, off-the-shelf Our solution generic completely...

10.1109/tnet.2015.2391300 article EN IEEE/ACM Transactions on Networking 2015-02-03

Device-to-device communication is important to emerging mobile applications such as Internet of Things and social networks. Authentication key agreement among multiple legitimate devices the first step build a secure channel. Existing solutions put into physical proximity use common radio environment proof identities secret agree on same key. However they experience very slow bit generation rate high errors, requiring several minutes 256-bit In this work, we design implement an...

10.1145/2976749.2978298 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2016-10-24

The research on Wi-Fi sensing has been thriving over the past decade but process not smooth. Three barriers always hamper research: 1) unknown baseband design and its influence; 2) inadequate hardware; 3) lack of versatile flexible measurement software. This article tries to eliminate these through following work. <i>First</i>, we present an in-depth study Qualcomm Atheros AR9300 (QCA9300) NIC. We identify a missing item existing channel state information (CSI) model, namely, CSI distortion,...

10.1109/jiot.2021.3104666 article EN IEEE Internet of Things Journal 2021-08-17

Comparing to well protected data frames, Wi-Fi management frames (MFs) are extremely vulnerable various attacks. Since MFs transmitted without encryption or authentication, attackers can easily launch attacks by forging the MFs. In a collaborative environment with many sniffers, such be detected sensing anomaly RSS changes. However, it is quite difficult identify these spoofing assistance from other nodes. By exploiting some unique characteristics (e.g., rapid spatial decorrelation,...

10.1109/infcom.2013.6567061 preprint EN 2013-04-01

Different from online shopping, in-store shopping has few ways to collect the customer behaviors before purchase. In this paper, we present design and implementation of an on-site Customer Behavior IDentification system based on passive RFID tags, named CBID. By collecting analyzing wireless signal features, CBID can detect track tag movements further infer corresponding behaviors. We model three main objectives behavior identification by concrete problems solve them using novel protocols...

10.1109/tnet.2015.2501103 article EN IEEE/ACM Transactions on Networking 2015-12-02

Device to device (D2D) communication is expected become a promising technology of the next-generation wireless systems. Security issues have technical barriers D2D due its "open-air" nature and lack centralized control. Generating symmetric keys individually on different parties without key exchange or distribution desirable but challenging. Recent work has proposed extract from measurement physical layer random variations channel, e.g., channel state information (CSI) orthogonal...

10.1109/iwqos.2014.6914340 article EN 2014-05-01

Crowd density estimating is a crucial service in many applications (e.g., smart guide, crowd control, etc.), which often conducted using pattern recognition technologies based on video surveillance. However, these kinds of methods are high cost, and cannot work well low-light environments. Radio frequency adopted more indoor application, since radio signal strength (RSS) can be easily obtained by various wireless devices without additional cost. In this paper, we introduce low cost method...

10.1109/jsen.2013.2259692 article EN IEEE Sensors Journal 2013-04-24

Device-free based object tracking provides a promising solution for many localization and systems to monitor non-cooperative objects which do not carry any transceiver such as intruders. However, existing device-free solutions mainly use sensors active RFID tags, are much more expensive compared passive tags. In this paper, we propose novel motion detection method using named Twins. The leverages phenomenon called critical state caused by interference among We theoretically explain via an...

10.1109/infocom.2014.6847970 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

This paper presents RF-Mehndi, a passive commercial RFID tag array formed identifier. The key RF-Mehndi novelty is that when the user's fingertip touching on surface during communication, backscattered signals by become user-dependent and unique. Hence, if we enhance communication modality of many personal cards nowadays in case card gets lost or stolen, it cannot be used illegally adversaries. To harvest such benefit, have two observations designing RF-Mehndi. first observation tags are...

10.1109/infocom.2019.8737419 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

Regular free-weight exercise helps to strengthen natural movements and stabilize muscles that are important strength, balance, posture of human beings. Prior works have exploited wearable sensors or RF signal changes for activity sensing, recognition, counting, etc.. However, none them incorporated three key factors necessary a practical monitoring system: recognizing activities on site, assessing their qualities, providing useful feedbacks the bodybuilder promptly. Our FEMO system provides...

10.1109/tmc.2017.2691705 article EN IEEE Transactions on Mobile Computing 2017-04-06

Federated learning (FL) is an emerging distributed and privacy-preserving machine framework. However, the performance of traditional FL methods seriously impaired by real-world data, which appear to be non-IID. The recent clustered federated (CFL) eliminate impact non-IID data grouping clients with similar distribution into same cluster. Unfortunately, existing CFL heavily rely on pre-setting cluster number, failing achieve adaptive client clustering. We also experimentally observe that...

10.1109/tbdata.2022.3167994 article EN IEEE Transactions on Big Data 2022-04-19

An important function of smart environments is the ubiquitous access computing devices. In public areas such as hospitals, libraries, and airports, people may want to interact with nearby systems get information, directions a hospital room, locations books, flight departure/arrival information. Touch screen based displays kiosks, which are commonly used today, incur extra hardware cost or even possible germ bacteria infection. This work provides new solution: users can make queries inputs by...

10.1109/icdcs.2017.141 article EN 2017-06-01

Multi-node localization is crucial for large-scale and densely deployed Internet of Things (IoT) devices connected via LoRaWAN. Due to limitations in bandwidth the number RX chains (antennas), existing LoRaWAN-based methods often rely on frequency hopping or additional infrastructure improve location accuracy. Although promising, these struggle localize multiple nodes during packet collisions. In this paper, we propose MC-LoRa, which features a multi-node pipeline that includes reliable...

10.1145/3712279 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2025-03-03

10.1109/icassp49660.2025.10888527 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12
Coming Soon ...