- Virtual Reality Applications and Impacts
- Privacy, Security, and Data Protection
- Augmented Reality Applications
- IoT and Edge/Fog Computing
- Visual Attention and Saliency Detection
- Interactive and Immersive Displays
- Privacy-Preserving Technologies in Data
- Tactile and Sensory Interactions
- Ethics and Social Impacts of AI
- Innovative Human-Technology Interaction
- User Authentication and Security Systems
- Human Mobility and Location-Based Analysis
- Image and Video Quality Assessment
- Context-Aware Activity Recognition Systems
- Opportunistic and Delay-Tolerant Networks
- Sexuality, Behavior, and Technology
- Structural Integrity and Reliability Analysis
- Advanced Database Systems and Queries
- Data Visualization and Analytics
- Robotics and Automated Systems
- Mobile Crowdsensing and Crowdsourcing
- Peer-to-Peer Network Technologies
- Engineering Diagnostics and Reliability
- Retinal Imaging and Analysis
- Engineering Education and Technology
University of Hong Kong
2016-2024
Hong Kong University of Science and Technology
2015-2024
Universidad de Oviedo
2014
Since the popularisation of Internet in 1990s, cyberspace has kept evolving. We have created various computer-mediated virtual environments including social networks, video conferencing, 3D worlds (e.g., VR Chat), augmented reality applications Pokemon Go), and Non-Fungible Token Games Upland). Such environments, albeit non-perpetual unconnected, bought us degrees digital transformation. The term `metaverse' been coined to further facilitate transformation every aspect our physical lives. At...
The boom in the capabilities and features of mobile devices, like smartphones, tablets, wearables, combined with ubiquitous affordable Internet access advances areas cooperative networking, computer vision, cloud computing transformed augmented reality (MAR) from science fiction to a reality. Although devices are more constrained computationalwise traditional computers, they have multitude sensors that can be used development sophisticated MAR applications assisted remote servers for...
The metaverse promises large-scale and persistent environments for users to share experiences at the intersection between physical digital. Augmented reality (AR) is one of primary technologies that supports blending digital content with environments. However, most AR applications are currently single-user present significant constraints in terms time location. Scaling up technology large-sized massively multi-user thus represents challenges achieving such a vision. Due these constraints,...
Augmented Reality (AR) applications are becoming more mainstream, with successful examples in the mobile environment like Pokemon GO. Current malicious techniques can exploit these environments' immersive and mixed nature (physical-virtual) to trick users into providing personal information, i.e., dark patterns. Dark patterns deceiving (e.g., interface tricks) designed influence individuals' behavioural decisions. However, there few studies regarding patterns' potential issues AR...
Data protection regulatory policies, such as the European Union's General Protection Regulation (GDPR), force website operators to request users' consent before collecting any personal information revealed through their web browsing. Website operators, motivated by potential value of collected data, employ various methods when designing notices (e.g., dark patterns) in order convince users allow collection much data possible. In this paper, we design and conduct a user study where 1100 MTurk...
The continued advancement in user interfaces comes to the era of virtual reality that requires a better understanding how users will interact with 3D buttons mid-air. Although owns high levels expressiveness and demonstrates ability simulate daily objects physical environment, most fundamental issue designing is surprisingly ignored. To this end, paper presents four variants buttons, considering two design dimensions key representations multi-modal cues (audio, visual, haptic). We conduct...
Driven by the recent improvements in device and networks capabilities, extended reality (XR) is becoming more pervasive; industry academia alike envision ambitious projects, such as metaverse. However, XR still limited current architecture of mobile systems. This article makes case for an XR-specific operating system (XROS). An XROS integrates hardware-support, computer vision algorithms, networking primitives supporting technology. These represent physical–digital world a single shared...
D2D interactions are promoted both in the context of traffic and computation offloading. Applications with functionalities that executed parallel more than one mobile device have been proposed while idea using another as a relay is going to be part 5G. In this work, we first present main types applications, then discuss characteristics task offloading quality experience ecosystems. After that, list five popular questions regarding ability other users helpful terms resources, connectivity,...
Augmented Reality (AR) and Mobile (MAR) applications have gained much research industry attention these days. The mobile nature of MAR limits users' interaction capabilities such as inputs, haptic feedbacks. This survey reviews current issues in the area human computer for devices. first presents sensing their applicability AR applications. We classify devices into two groups according to triggered sense: cutaneous/tactile: touch, active surfaces, mid-air, kinesthetic: manipulandum, grasp,...
We live in an era where we are overloaded with data, and this can be the key for gaining rich insights about our world. Augmented reality (AR) enables us possibility to visualize analyse growing torrent of data interactive canvas. display complex structures simpler more understandable ways that was not possible before. Big Data is a new paradigm results from myriad sources such as transactions, Internet, social networks, health care devices sensor networks. AR big have logical maturity...
The ubiquity of smart devices, combined with a lack information about data garnered by them, make privacy significant challenge for adopting devices. Ensuring users can safeguard their without compromising the devices' functionality requires effective yet intuitive ways to manage personal preferences. Current solutions management are severely lacking as they ineffective in making aware potential risks or how mitigate them and offer limited support interaction. As our first contribution, we...
The increasing complexity of smartphone applications and services necessitate high battery consumption, but the growth smartphones' capacity is not keeping pace with these power demands. To overcome this problem, researchers gave birth to Mobile Cloud Computing (MCC) research area. In paper, we advance on previous ideas, proposing implementing a Near Field Communication (NFC)-based computation offloading framework. This motivated by advantages NFC's short distance communication, its better...
E-commerce has become an important activity where new advances in technology shape the shopper experience. At same time, metaverse is seen as next milestone to revolutionize e-commerce experience, immersion, realism, and ubiquity are its main features. However, under such circumstances, manipulative designs 'trick' users toward intended choices or outcomes can more effective. This paper sheds light on design space of techniques applications for meta-verse, reinforcing our understanding...
Recent advances in machine and deep learning allow for enhanced retail analytics by applying object detection techniques. However, existing approaches either require laborious installation processes to function or lack precision when the customers turn their back installed cameras. In this paper, we present EyeShopper, an innovative system that tracks gaze of shoppers facing away from camera provides insights about behavior physical stores. EyeShopper is readily deployable surveillance...
The General Data Protection Regulation (GDPR) presents directives to give data subjects control over their personal data. These impose data-collecting and processing organizations take concrete actions for privacy preservation of users non-users alike. Significant challenges arise when applying these mobile ubiquitous computing. Mobile computing aim computer use be as transparent seamless possible. Inconspicuous devices continually sense environment, often without the subject's knowledge....
We develop Hyperion a Wearable Augmented Reality (WAR) system based on Google Glass to access text information in the ambient environment. is able retrieve content from users' current view and deliver them different ways according their context. design four work modalities for situations that mobile users encounter daily activities. In addition, user interaction interfaces are provided adapt application scenarios. Although may be constrained by its poor computational capabilities limited...
Nowadays privacy in the connected world is a big user's concern. The ubiquity of mobile devices permits billions users browse web at anytime, anywhere. Near Field Communication (NFC) appeared as seamlessly and simply communication protocol between devices. Commercial services such Android Pay, Apple Pay offer contactless payment methods that are spreading more scenarios. However, we take risks while using NFC on devices, can be hacked, our affected. In this paper study current...
The success of data forwarding applications in opportunistic networks (OppNets) primarily depends on the altruistic behavior users who form network. Therefore, a good study user altruism is crucial designing and building effective OppNets. Here battery resource constraint relaying for others decision. We conducted two types experiments, one with an Android application other based AMT platform. With around 800 subjects, we found that are approximately 0.50 - 0.70 average they less likely to...
The advancement of artificial intelligence and wearable computing triggers the radical innovation cognitive applications. In this work, we propose VIMES, an augmented reality-based memory assistance system that helps recall declarative memory, such as whom user meets what they chat. Through a collaborative method with 20 participants, design runs on smartglasses, takes first-person audio video input, extracts personal profiles event information to display embedded or smartphone. We perform...
Research on smart device privacy has consistently highlighted how is an important concern for users, but they fail to act their concerns. While this discrepancy between user perceptions and actions been reported, currently there a limited understanding of why the case or situation can be ameliorated. This paper systematically studies visualizations in assistants improve situation, reporting two that explore users' ecosystems. The first study shows displaying location data type reduces...
The wide spread of smart mobile devices such as tablets and phones makes crowdsensing a viable approach for collecting data monitoring phenomena common interest. Smart can sense compute their surroundings contribute to mechanisms that examine social collective behaviours. Crowdsensing offers feasible alternative exchange sensing tasks between devices. Due the limited resources (i.e., battery, processing power, memory) devices, cooperation hence, performance applications may be affected. We...
The integrity of pipelines during the transportation flammable fluids requires development or implementation repair/rehabilitation techniques that ensure their performance over time in a cost-effective way, due to high and potential costs result from failure (loss life, damage property, penalties service interruption). In this work, review typical defectology found gas transport steel pipeline systems is described. As part review, current status technologies implemented for repair...