- Indoor and Outdoor Localization Technologies
- RFID technology advancements
- Mobile Crowdsensing and Crowdsourcing
- Energy Harvesting in Wireless Networks
- Remote-Sensing Image Classification
- Caching and Content Delivery
- Robotics and Sensor-Based Localization
- Physical Unclonable Functions (PUFs) and Hardware Security
- Underwater Vehicles and Communication Systems
- User Authentication and Security Systems
- Remote Sensing and Land Use
- Speech and Audio Processing
- Advanced Image Fusion Techniques
- Engineering and Test Systems
- Bluetooth and Wireless Communication Technologies
- Music Technology and Sound Studies
- Internet Traffic Analysis and Secure E-voting
- Advanced Authentication Protocols Security
- Blockchain Technology Applications and Security
- Speech Recognition and Synthesis
- Advanced Decision-Making Techniques
- Opportunistic and Delay-Tolerant Networks
- Interactive and Immersive Displays
- Music and Audio Processing
- Marine Ecology and Invasive Species
Xi'an Jiaotong University
2016-2025
Ministry of Education of the People's Republic of China
2025
China University of Petroleum, East China
2022-2023
Henan Polytechnic University
2023
Xi'an Technological University
2023
University of California, Santa Cruz
2018-2022
Wuhan University of Technology
2022
Macau University of Science and Technology
2022
Beijing Jiaotong University
2019
Beijing University of Posts and Telecommunications
2018
We provide the first solution to an important question, "how a physical-layer authentication method can defend against signal replay attacks''. It was believed that if attacker exact same reply of legitimate object (such as RFID tag), any will fail. This paper presents Hu-Fu, physical layer protocol is resilient major attacks including tag counterfeiting, replay, compensation, and brute-force feature reply. Hu-Fu built on two fundamental ideas, namely inductive coupling tags randomization....
An important function of smart environments is the ubiquitous access computing devices. In public areas such as hospitals, libraries, and airports, people may want to interact with nearby systems get information, directions a hospital room, locations books, flight departure/arrival information. Touch screen based displays kiosks, which are commonly used today, incur extra hardware cost or even possible germ bacteria infection. This work provides new solution: users can make queries inputs by...
Abstract Spintronic devices represent a promising advancement in information storage, sensors, RF/microwave tunable devices, and other applications. Recently, researchers have developed novel approach to energy‐efficiently manipulate spin states using photovoltaic (PV) thin‐film. However, optimization strategies for this method are relatively scarce. Here, PV/magnetic thin film heterojunction featuring perovskite quantum dots (PQDs) composite layer is presented with hybrid interfacial...
Passive Radio Frequency Identification (RFID) tags have been widely applied in many applications, such as logistics, retailing, and warehousing. In situations the relative locations of objects are more important than their absolute locations. However, state-of-art localization methods need continuing movement readers, which limit application domain scalability. this paper, we propose a approach for passive that requires no device movement. Instead, our method utilizes signal changes caused...
We study a new problem, refined localization, in this paper. Refined localization calculates the location of an object high precision, given that is relatively small region such as surface table. useful many cyber-physical systems industrial autonomous robots. Existing vision-based approaches suffer from several disadvantages, including good lighting conditions, line sight, pre-learning process, and computation overhead. Also cannot differentiate objects with similar colors shapes. This...
Smart packaging adds sensing abilities to traditional packages. This paper investigates the possibility of using RF signals test internal status packages and detect abnormal changes. Towards this goal, we design implement a nondestructive package testing verification system commodity passive RFID systems, called Echoscope. Echoscope extracts unique features from backscatter penetrating space compares them with previously collected during check-in phase. The use guarantees that there is no...
Estimating 3D human mesh is appealing for various application scenarios. Current mainstream solution predicts the meshes either from image or reflected RF-signals. In this paper, instead of investigating which approach better, we propose to design a multi-modality fusion framework, namely MI-Mesh, estimates by fusing and mmWave. To realize this, deep neural network model. It first automatically correlate mmWave point clouds certain joints extracts useful fused features two modalities. Then,...
The extraction of Metal-Organic Frameworks (MOFs) synthesis conditions from literature text has been challenging but crucial for the logical design new MOFs with desirable functionality. recent advent large language models (LLMs) provides disruptively solution to this long-standing problem and latest researches have reported over 90% F1 in extracting correct literature. We argue paper that most existing practices LLMs stay primitive zero-shot learning, which could lead downgraded application...
RFID tag authentication is challenging because most commodity tags cannot run cryptographic algorithms. Prior research demonstrates that physical layer information based a promising solution, which uses special features from the backscatter signals as their fingerprints. However, our recent studies show existing physical-layer may fail if feature collection and are conducted in different locations, due to location-dependent noises, environmental factors, or reader hardware differences. This...
As the Ultra High Frequency (UHF) passive Radio IDentification (RFID) technology becomes increasingly deployed, it faces an array of new security attacks. In this paper, we consider a type attack in which malicious RFID reader could arbitrarily modify tags via standard commands, e.g., IDs or other data memory. To deal with attack, propose physical-layer RF signal based authentication solution, namely Arbitrator, that involves passively listening on channels, analyzing communication signals,...
Smart environments and security systems require automatic detection of human behaviors including approaching to or departing from an object. Existing motion usually beings carry special devices, which limits their applications. In this paper, we present a system called APID detect arm reaching by analyzing backscatter communication signals passive RFID tag on the does not any device. The idea is based influence movements vibration backscattered signals. compatible with commodity...
There have been increasing interests in exploring the sensing capabilities of RFID to enable numerous IoT applications, including object localization, trajectory tracking, and human behavior sensing. However, most existing methods rely on signal measurement either a low multipath environment, which is unlikely exist many practical situations, or with special devices, increase operating cost. This paper investigates possibility measuring `multi-path-free' information multipath-prevalent...
We provide the first solution to an important question, "how a physical-layer authentication method can defend against signal replay attacks". It was believed that if attacker exact same reply of legitimate object (such as RFID tag), any will fail. This paper presents Hu-Fu, physical layer protocol is resilient major attacks including tag counterfeiting, replay, compensation, and brute-force feature reply. Hu-Fu built on two fundamental ideas, namely inductive coupling tags randomization....
Speech enhancement can benefit lots of practical voice-based interaction applications, where the goal is to generate clean speech from noisy ambient conditions. This paper presents a design, namely UltraSpeech, enhance by exploring correlation between ultrasound (profiled articulatory gestures) and speech. UltraSpeech uses commodity smartphone emit collect composed acoustic signal for analysis. We design complex masking framework deal with complex-valued spectrograms, incorporating magnitude...
Crypto management is proposed to tackle the decision-making challenges under data asymmetry and trust that cannot be solved merely by technical means. It emphasizes novel model for real-time generation of reliable, trustworthy, usable decisions based on blockchain blockchain-driven technologies. First, framework crypto with detailed descriptions each technique introduced, where underlying technology, decentralized autonomous organization (DAO) structure, federated decision basis, smart...
Smart packaging adds sensing abilities to traditional packages. This paper investigates the possibility of using RF signals test internal status packages and detect abnormal changes. Towards this goal, we design implement a nondestructive package testing verification system commodity passive RFID systems, called Echoscope. Echoscope extracts unique features from backscatter penetrating space compares them with previously collected during check-in phase. The use guarantees that there is no...
Passive Radio Frequency Identification (RFID) tags have been widely applied in many applications, such as logistics, retailing, and warehousing. In situations, the order of objects is more important than their absolute locations. However, state-of-art ordering methods need a continuing movement readers, which limit application domain scalability. this paper, we propose 2-dimension approach for passive that requires no device movement. Instead, our method utilizes signal changes caused by...
There have been increasing interests in exploring the sensing capabilities of RFID to enable numerous IoT applications, including object localization, trajectory tracking, and human behavior sensing. However, most existing methods rely on signal measurement either a low multipath environment, which is unlikely exist many practical situations, or with special devices, increase operating cost. This paper investigates possibility measuring `multipath-free' information multipath-prevalent...