Dianqi Han

ORCID: 0000-0002-0105-5869
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • RFID technology advancements
  • Advanced Malware Detection Techniques
  • Security in Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Interactive and Immersive Displays
  • Indoor and Outdoor Localization Technologies
  • Wireless Signal Modulation Classification
  • Biometric Identification and Security
  • Speech and Audio Processing
  • Wireless Communication Security Techniques
  • Music and Audio Processing
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced Authentication Protocols Security
  • Full-Duplex Wireless Communications
  • Mathematical Approximation and Integration
  • Digital Media Forensic Detection
  • Energy Harvesting in Wireless Networks
  • Mobile Ad Hoc Networks
  • Internet Traffic Analysis and Secure E-voting
  • Hate Speech and Cyberbullying Detection
  • Bluetooth and Wireless Communication Technologies
  • Cognitive Radio Networks and Spectrum Sensing
  • Probabilistic and Robust Engineering Design
  • Gait Recognition and Analysis

The University of Texas at Arlington
2022-2024

Sun Yat-sen University
2023

Arizona State University
2018-2022

Mobile two-factor authentication (2FA) has become commonplace along with the popularity of mobile devices. Current 2FA solutions all require some form user effort which may seriously affect experience users, especially senior citizens or those disability such as visually impaired users. In this paper, we propose Proximity-Proof, a secure and usable system without involving interactions. Proximity-Proof automatically transmits user's response via inaudible OFDM-modulated acoustic signals to...

10.1145/3241539.3241574 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2018-10-15

Indoor navigation systems are very useful in large complex indoor environments such as shopping malls. Current focus on improving localization accuracy and must be combined with an accurate labeled floor plan to provide usable services. Such plans often unavailable or involve a prohibitive cost manually obtain. In this paper, we present IndoorWaze, novel crowdsourcing-based context-aware system that can automatically generate POIs for the first time literature. IndoorWaze combines Wi-Fi...

10.1109/twc.2020.2993545 article EN IEEE Transactions on Wireless Communications 2020-05-16

Passive RFID technology is widely used in user authentication and access control. We propose RF-Rhythm, a secure usable two-factor system with strong resilience to lost/stolen/cloned cards. In each legitimate performs sequence of taps on his/her card according self-chosen secret melody. Such rhythmic can induce phase changes the backscattered signals, which reader detect recover user’s tapping rhythm. addition verifying card’s identification information as usual, backend server compares...

10.1109/infocom41043.2020.9155427 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

Commodity ultra-high-frequency (UHF) RFID authentication systems only provide weak user authentication, as tags can be easily stolen, lost, or cloned by attackers. This paper presents the design and evaluation of SmartRFID, a novel UHF system to promote commodity crypto-less for security-sensitive applications. SmartRFID explores extremely popular smart devices requires legitimate enroll his device along with tag. Besides authenticating tag usual, verifies whether simultaneously possesses...

10.1109/twc.2022.3226753 article EN IEEE Transactions on Wireless Communications 2022-12-12

Cooperative spectrum sensing (CSS) adopted by spectrum-sensing providers (SSPs) plays a key role for dynamic access and is essential avoiding interference with licensed primary users (PUs). A typical SSP system consists of geographically distributed sensors which can be compromised to submit fake reports. In this paper, we propose SpecKriging, new spatial-interpolation technique based on Inductive Graph Neural Network Kriging (IGNNK) secure CSS. first pretrain graphical neural network (GNN)...

10.1109/twc.2022.3181064 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2022-06-14

Tag cloning and spoofing pose great challenges to RFID applications. This paper presents the design evaluation of RCID, a novel system fingerprint tags based on unique reflection coefficient each tag circuit. Based OFDM-based collector, our can quickly acquire verify tag's RCID which are independent reader measurement environment. Our applies COTS readers after firmware update at reader. Extensive prototyped experiments 600 confirm that is highly secure with authentication accuracy up 97.15%...

10.1109/infocom48880.2022.9796663 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02

The Internet of Things (IoT) networks are finding massive applications in mission-critical contexts. A group key is needed to encrypt and authenticate broadcast/multicast messages commonly seen large-scale wireless networks. In this paper, we propose DroneKey, a novel drone-aided PHY-based Group-Key Generation (GKG) scheme for IoT drone dispatched fly along random 3D trajectories keep broadcasting standard signals refresh the keys whole network. Every device receives broadcast from which...

10.1145/3460120.3484789 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

Wireless home alarm systems are being widely deployed, but their security has not been well studied. Existing attacks on wireless exploit the vulnerabilities of networking protocols while neglecting problems arising from physical component IoT devices. In this paper, we present new event-eliminating and event-spoofing commercial by interfering with reed switch in almost all COTS sensors. both attacks, external adversary uses his own magnet to control state order either eliminate legitimate...

10.1109/infocom42981.2021.9488873 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2021-05-10

Secure and usable user authentication is the first line of defense against cyber attacks on smart end-user devices. Advanced hacking techniques pose severe threats to traditional systems based password/PIN/fingerprint. We propose MagAuth, a secure two-factor scheme with commercial off-the-shelf (COTS) wrist wearables magnetic strap bands enhance security usability password-based for mobile touchscreen In enrolls self-chosen unlock pattern or touch gesture into his device by performing it...

10.1109/tmc.2021.3072598 article EN IEEE Transactions on Mobile Computing 2021-04-12

Wireless networks of different technologies may interfere with each other when they are deployed at proximity. Such cross-technology interference (CTI) has become prevalent the surge IoT devices. In this paper, we exploit CTI in coexisting WiFi-Zigbee and propose DeepJam, a new stealthy jamming strategy, to jam Zigbee traffic. DeepJam relies on deep learning techniques capture temporal pattern past wireless traffic predict future By only victim's transmissions that not disrupted by CTI, can...

10.1109/tnet.2021.3082839 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2021-05-28

Passive RFID technology is widely used in user authentication and access control. We propose RF-Rhythm, a secure usable two-factor system with strong resilience to lost/stolen/cloned cards. In each legitimate performs sequence of taps on his/her card according self-chosen secret melody. Such rhythmic can induce phase changes the backscattered signals, which reader detect recover user's tapping rhythm. addition verifying card's identification information as usual, backend server compares...

10.1109/tnet.2022.3204204 article EN IEEE/ACM Transactions on Networking 2022-09-14

Continuous location authentication (CLA) seeks to continuously and automatically verify the physical presence of legitimate users in a protected indoor area. CLA can play an important role contexts where access electrical or resources must be limited physically present users. In this paper, we WearRF-CLA, novel scheme built upon increasingly popular wrist wearables UHF RFID systems. WearRF-CLA explores observation that human daily routines area comprise sequence human-states (e.g., walking...

10.1145/3488932.3517426 article EN Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2022-05-24

Acoustic fingerprinting aims to identify a mobile device based on its internal microphone(s) and speaker(s) which are unique due manufacturing imperfection. This paper seeks thorough understanding of the (in)security exploring acoustic fingerprints for achieving distributed authentication. Our contributions threefold. First, we present new fingerprint-emulation attack demonstrate that it is common vulnerability authentication systems. Second, propose dynamic challenge-response defense secure...

10.1109/tmc.2021.3053282 article EN IEEE Transactions on Mobile Computing 2021-01-21

We propose WristUnlock, a novel technique that uses wrist wearable to unlock smartphone in secure and usable fashion. WristUnlock explores both the physical proximity Bluetooth connection between wearable. There are two modes with different security usability features. In WristRaise mode, user raises his natural way same arm carrying wearable; gets unlocked if acceleration data on satisfy an anticipated relationship specific himself. WristTouch sends random number through channel touch-based...

10.1109/cns.2019.8802715 article EN 2019-06-01

In this paper, we first use an L2−discrepancy bound to give the expected uniform integration approximation for functions in Sobolev space H1(K) equipped with a reproducing kernel. The concept of stratified sampling under general equal measure partition is introduced into research. For different modes, obtain better convergence order O(N−1−1d) set than Monte Carlo method and Latin hypercube method. Second, several bounds boundary conditions Fd,q∗, where 1p+1q=1. Probabilistic Lp−discrepancy...

10.1016/j.rinam.2023.100419 article EN cc-by-nc-nd Results in Applied Mathematics 2023-12-08

Passive RFID technology is widely used in user authentication and access control. We propose RF-Rhythm, a secure usable two-factor system with strong resilience to lost/stolen/cloned cards. In each legitimate performs sequence of taps on his/her card according self-chosen secret melody. Such rhythmic can induce phase changes the backscattered signals, which reader detect recover user's tapping rhythm. addition verifying card's identification information as usual, backend server compares...

10.48550/arxiv.2003.08923 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Ubiquitous smartphones can be powerful tools to access IoT devices. Proximity-based control (PBAC) is needed such that devices only allow data by legitimate users in close proximity. Traditional smartphone-based authentication techniques do not satisfy the PBAC requirements. This paper presents SmartMagnet, a novel scheme combines and cheap magnets achieve for SmartMagnet explores few cheap, tiny commodity which we propose attach or embed into devices, as well magnetometer attitude sensor on...

10.1109/tmc.2022.3149746 article EN IEEE Transactions on Mobile Computing 2022-02-08
Coming Soon ...