Xin Na

ORCID: 0000-0002-0986-5209
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Harvesting in Wireless Networks
  • Wireless Networks and Protocols
  • Indoor and Outdoor Localization Technologies
  • Advanced SAR Imaging Techniques
  • UAV Applications and Optimization
  • Nanofluid Flow and Heat Transfer
  • Heat Transfer Mechanisms
  • Energy Efficient Wireless Sensor Networks
  • Advanced MIMO Systems Optimization
  • Wireless Body Area Networks
  • Underwater Vehicles and Communication Systems
  • IoT Networks and Protocols
  • Context-Aware Activity Recognition Systems
  • Fish biology, ecology, and behavior
  • Cooperative Communication and Network Coding
  • Water Systems and Optimization
  • Alkaloids: synthesis and pharmacology
  • Target Tracking and Data Fusion in Sensor Networks
  • Fluid Dynamics and Turbulent Flows
  • Healthcare Systems and Reforms
  • Flow Measurement and Analysis
  • Aerospace and Aviation Technology
  • Radar Systems and Signal Processing
  • Cognitive Radio Networks and Spectrum Sensing
  • Retinopathy of Prematurity Studies

Tsinghua University
2021-2025

China Pharmaceutical University
2023

Beihang University
2022

Kunming Medical University
2019

Shijiazhuang Tiedao University
2012

Yichun University
2012

With the rapid development of Internet Things (IoT) and rise 5G communication networks automatic driving, millimeter wave (mmWave) sensing is emerging starts impacting our life workspace. mmWave can sense humans objects in a contactless way, providing fine-grained ability. In past few years, many techniques have been proposed applied various human applications (e.g., localization, gesture recognition, vital monitoring). We discover need comprehensive survey to summarize technology, platforms...

10.1109/comst.2023.3298300 article EN IEEE Communications Surveys & Tutorials 2023-01-01

Backscatter is an enabling technology for battery-free sensing in today's Artificial Intelligence of Things (AIOT). Building a backscatter-based system, however, daunting task, due to two obstacles: the unaffordable power consumption microprocessor and coexistence with ambient carrier's traffic. In order address above issues, this paper, we present Leggiero, first-of-its-kind analog WiFi backscatter payload transparency. Leveraging specially designed circuit varactor diode, design avoids...

10.1145/3581791.3596835 article EN 2023-06-16

10.1109/infocom52122.2024.10621258 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2024-05-20

WiFi-based device localization is a key technology for smart applications, while most of which rely on LoS signals to work. However, in real-world indoor environments, very few are usable accurate localization. This paper presents Bifrost , novel hardware-software co-design cope with this practical problem. The core idea reinvent WiFi provide sufficient signals. Specifically, we present low-cost plug-in design leaky wave antenna (LWA) that can generate orthogonal polarized signals: On one...

10.1145/3725850 article EN cc-by ACM Transactions on Sensor Networks 2025-03-25

Fish can perceive the surrounding flow field using their lateral line systems, consisting of canal neuromasts (CNs) for pressure gradient perception and superficial (SNs) velocity detection. Although various artificial (ALL) systems have been developed inspired by fish, few studies combined both sensors hydrodynamic perception, how to optimize sensor placement remains unanswered, particularly on three-dimensional models. Herein we proposed a maximized stimulation strategy optimization. We...

10.1109/lra.2022.3143203 article EN IEEE Robotics and Automation Letters 2022-01-14

As a novel fluid of functional material, magnetohydrodynamic (MHD) micropolar has the special properties light, heat, magnetic and so on. It is highly practical significance. The characteristics flow, heat mass transfer in MHD nanofluid boundary layer past stretching plate are investigated based on theory present numerical work. In presence field, viscous dissipation cross-diffusion caused by Dufour effect Soret considered. First order slip velocity condition employed. Mathematical models...

10.1016/j.heliyon.2024.e26958 article EN cc-by-nc Heliyon 2024-02-28

Small Unmanned Aerial Vehicles (UAVs) are becoming potential threats to security-sensitive areas and personal privacy. A UAV can shoot photos at height, but how detect such an uninvited intruder is open problem. This paper presents mmHawkeye, a passive approach for detection with COTS millimeter wave (mmWave) radar. mmHawkeye doesn't require prior knowledge of the type, motions, flight trajectory UAV, while exploiting signal feature induced by UAV's periodic micro-motion (PMM) long-range...

10.1109/secon58729.2023.10287526 article EN 2023-09-11

iBeacon protocol is widely deployed to provide location-based services. By receiving its BLE advertisements, nearby devices can estimate the proximity or calculate indoor positions. However, open nature of these advertisements brings vulnerability impersonation attacks. Such attacks could lead spam, unreliable positioning, and even security breaches. In this paper, we propose Wi-attack, revealing feasibility using WiFi conduct on Different from compatible hardware, Wi-attack not restricted...

10.1109/secon52354.2021.9491605 preprint EN 2021-07-06

Accurate perception of flight parameters is essential for the safe and stable small unmanned aerial systems (SUASs). However, traditional flush air data sensing (FADS) require complex tubing fuselage openings. Herein this study, a flexible skin system integrated with pressure thermal flow sensor array, dual‐sensor fusion algorithm determining angle attack (AOA) airspeed ( V ∞ ), are proposed. By establishing an error back‐propagation neural network, modality demonstrates higher estimation...

10.1002/aisy.202100276 article EN cc-by Advanced Intelligent Systems 2022-03-15

Time-Slotted Channel Hopping (TSCH) is a popular link-layer pro-tocol defined in the IEEE 802.15.4e standard that improves reli-ability and throughput of wireless sensor networks by exploiting diversity both time frequency. Despite body literature proposing several scheduling schemes for TSCH, gap yet to be filled design an effective way deal with internal external interference, which are known strongly affect communication performance. In fact, existing works either make use fixed schedule...

10.1109/ipsn54338.2022.00035 article EN 2022-05-01

Introduction Enhancing the wellbeing of residents through universal health coverage (UHC) is a long-term policy goal for China. In 2016, China integrated New Rural Cooperative Medical Scheme (NRCMS) and Urban Resident Basic Insurance (URBMI) into (URRBMI) to address problem fragmentation. Objective The objective this study was investigate whether integration basic medical insurance had an impact on subjective Chinese residents. Methods Using Household Finance Survey data 2015 2019, we...

10.3389/fpubh.2023.1211350 article EN cc-by Frontiers in Public Health 2023-08-16

Cross-Technology Communication (CTC) emerges as a technology to enable direct communication across different wireless technologies. The state of the art on CTC employs physical-level emulation. Due protocol incompatibility and hardware restriction, there are intrinsic emulation errors between emulated signals legitimate signals. Unresolved hurt reliability achievable throughput, but how improve remains challenging problem. Taking from WiFi BLE an example, this work first presents...

10.1145/3469031 article EN ACM Transactions on Sensor Networks 2021-10-22

Small Unmanned Aerial Vehicles (UAVs) are becoming potential threats to security-sensitive areas and personal privacy. A UAV can shoot photos at height, but how detect such an uninvited intruder is open problem. This article presents mmHawkeye, a passive approach for non-cooperative detection identification with commercial off-the-shelf millimeter wave (mmWave) radar. mmHawkeye does not require prior knowledge of the type, motions, flight trajectory UAV, while exploiting signal feature...

10.1145/3638767 article EN ACM Transactions on Sensor Networks 2023-12-27

The paper discusses the instrumentation of leak detection and location on underground water supply pipelines based adaptive algorithms. equipment is designed to be self-contained portably mobile with sensors, signal conditioning data acquisition units a laptop PC operating processing, information analysis instrument control. vibrational acoustic signals collected tubular are used for pinpointing or leaks in buried pipelines. Because complexity heavy corruption ambient noises, it essential...

10.1117/12.599452 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2005-05-16

The ever-developing Internet of Things (IoT) brings the prosperity wireless sensing and control applications. In many scenarios, different technologies coexist in shared frequency medium as well physical space. Such coexistence may lead to serious cross-technology interference (CTI) problems, e.g. channel competition, signal collision, throughput degradation. Compared with traditional methods like avoidance, tolerance, concurrency mechanism, direct timely information exchange among...

10.48550/arxiv.2203.14813 preprint EN cc-by-nc-nd arXiv (Cornell University) 2022-01-01

Small Unmanned Aerial Vehicles (UAVs) are becoming potential threats to security-sensitive areas and personal privacy. A UAV can shoot photos at height, but how detect such an uninvited intruder is open problem. This paper presents mmHawkeye, a passive approach for detection with COTS millimeter wave (mmWave) radar. mmHawkeye doesn't require prior knowledge of the type, motions, flight trajectory UAV, while exploiting signal feature induced by UAV's periodic micro-motion (PMM) long-range...

10.48550/arxiv.2308.06479 preprint EN cc-by arXiv (Cornell University) 2023-01-01

In the process of scientific and technical awarding review each phase involves a lot score information. order to embody fairness impartiality process, safety protection data is particularly important. Through research system’s characteristics, this paper adopts tamper resistant technology suitable for system guarantee security scores. Practice proves that use these techniques greatly enhance stability system.

10.4028/www.scientific.net/amr.430-432.869 article EN Advanced materials research 2012-01-01
Coming Soon ...