- Speech and Audio Processing
- IoT and Edge/Fog Computing
- Artificial Intelligence in Games
- Advanced Data Storage Technologies
- Music and Audio Processing
- Advanced Measurement and Detection Methods
- Augmented Reality Applications
- Virtual Reality Applications and Impacts
- Privacy-Preserving Technologies in Data
- Robotics and Sensor-Based Localization
- Speech Recognition and Synthesis
- Educational Games and Gamification
- Network Security and Intrusion Detection
- Distributed and Parallel Computing Systems
- User Authentication and Security Systems
- Human Mobility and Location-Based Analysis
- Indoor and Outdoor Localization Technologies
- Video Analysis and Summarization
- Digital Games and Media
- Wireless Communication Security Techniques
- Robotic Path Planning Algorithms
- Video Surveillance and Tracking Methods
- Data Management and Algorithms
- Parallel Computing and Optimization Techniques
- Blockchain Technology Applications and Security
West Chester University
2016-2022
Henan Institute of Technology
2021
Southwest University of Science and Technology
2021
Wuhan Science and Technology Bureau
2021
Shanghai Electric (China)
2021
Nanjing University
2020
Nanyang Technological University
2020
China Electronics Technology Group Corporation
2019
University at Buffalo, State University of New York
2012-2017
Beijing University of Posts and Telecommunications
2017
Location-based social networks (LBSNs) feature friend discovery by location proximity that has attracted hundreds of millions users world-wide. While leading LBSN providers claim the well-protection their users' privacy, for first time we show through real world attacks these claims do not hold. In our identified attacks, a malicious individual with capability no more than regular user can easily break most LBSNs manipulating information fed to client apps and running them as oracles. We...
Voice, as a convenient and efficient way of information delivery, has significant advantage over the conventional keyboard-based input methods, especially on small mobile devices such smartphones smartwatches. However, human voice could often be exposed to public, which allows an attacker quickly collect sound samples targeted victims further launch impersonation attacks spoof those voice-based applications. In this paper, we propose design implementation robust software-only defense system,...
With the increasing penetration of Internet things (IoT) into people's lives, limitations traditional medical systems are emerging. First, typical way handling sensitive information can easily lead to privacy disclosure. Second, system is relatively isolated. It difficult for one share data with another, and scope users' activities limited within boundary. To solve these two problems, we propose a new privacy-preserving data-sharing scheme by introducing authorization mechanism...
Compared to previous head-mounted displays, the compact and low-cost Oculus Rift has claimed offer improved virtual reality experiences. However, how what kinds of user experiences are encountered by people when using in actual gameplay not been examined. We present an exploration 10 participants' playing a first-person shooter game Rift. Despite cybersickness lack control, participants experienced heightened experiences, richer engagement with passive elements, higher degree flow deeper...
Lack of an accurate and low-cost method to reconstruct indoor maps is the main reason behind current sporadic availability digital building floor plans. The conventional approach using professional equipment very costly only available in most popular areas. In this paper, we propose demonstrate CrowdMap, a crowd sourcing system utilizing sensor-rich video data from mobile users for plan reconstruction with low-cost. key idea CrowdMap first jointly leverage sourced sensory track user...
Short-range wireless communication technologies have been used in many security-sensitive smartphone applications and services such as contactless micro payment device pairing. Typically, the data confidentiality of existing short-range systems relies on so-called "key-exchange then encryption" mechanism, which is inefficient, especially for short sessions. In this work, we present <formula formulatype="inline" xmlns:mml="http://www.w3.org/1998/Math/MathML"...
Crowdsourcing is a technology with the potential to revolutionize large-scale data gathering in an extremely cost-effective manner. It provides unprecedented means of collecting from physical world, particularly through use modern smartphones, which are equipped high-resolution cameras and various micro-electrical sensors. In this paper, we address critical task reconstructing indoor interior view building crowdsourced data. We propose, design, prototype IndoorCrowd2D, smartphone-empowered...
Augmented reality (AR) applications that overlay the perception of real world with digitally generated information are on cusp commercial viability. AR has appeared in several platforms like Microsoft HoloLens and smartphones. They extend user experience beyond two dimensions supplement normal 3D a user. A typical location-based multi-player application works through three-step process, wherein system collects sensory data from world, identifies objects based their context, finally, renders...
The convergence of AI and IoT enables data to be quickly explored turned into vital decisions, however, there are still some challenging issues further addressed. For example, lacking enough in AI-based decision making [so-called sparse (SDM)] will decrease the efficiency dramatically, or even disable intelligent networks. Taking networks as network infrastructure, recommendation systems have been facing such SDM problems. A naive solution is introduce trust information. However, information...
The recent proliferation of smartphones has been the primary driving factor behind booming voice-based mobile applications. However, human voice is often exposed to public in many different scenarios, and an adversary can easily "steal" a person's attack applications with help state-of-the-art synthesis/conversion softwares. In this paper, we propose robust software-based liveness detection system for defending against spoofing attack. proposed tailored platforms be integrated existing We...
The conductive magnetic film will produce eddy current loss when it works in a high-frequency band, which reduce the performance of bulk acoustic wave magnetoelectric (BAW ME) devices. If is not taken into account devices modeling, models be seriously distorted. Therefore, combining Maxwell's equations with constitutive relations ME material, we define angle as figure merit to evaluate loss. Then rate potential energy and average radiated power are constructed, respectively. finite element...
Voiceprint-based authentication is fast becoming the everyday norm since it much easier to use and provides better security. However, current voiceprint-based systems are vulnerable various replay attacks. To tackle spoofing attacks, we propose a new system that leverages structural differences between human vocal loudspeakers unique vibration pattern of both cord throat as key differentiating factor for liveness detection. Specially, model relationship voices collected by two microphones...
The recent proliferation of Internet Things (IoT) device coupled with the demand for an inexpensive way transmitting data has been primary factors behind popularity short-range acoustic communication. It enables a seamless transfer digital information via soundwaves, using device's loudspeaker and microphone only whole interaction takes place without need network connection. Due to limited computational power IoT device, communication system adopted friendly jamming technology save energy....
Real-time strategy (RTS) is a sub-genre of video games. RTS games are more realistic with dynamic and time-constraint game playing, by abandoning the turn-based rule its ancestors. Playing against computer-controlled players pervasive phenomenon in games, due to convenience preference groups players. Hence, better game-playing agents able enhance experience acting as smart opponents or collaborators. One-way improving agents' performance, terms their economic-expansion tactical...
Exploration is an essential part of play in modern video games. It refers to the discovery-based activities, which players explore mechanisms, as well spatiality virtual world. games and with exploration plots are booming gamer communities. In this paper, we focus on spatial exploration, central role-playing (RPG) real time strategy (RTS) We investigate game-playing behaviors human games, so discover behavior patterns understand styles. The intention contribute design development believable...
Grade classification of seed cotton is a major problem that has an significant impact on the agricultural economy. According to characteristics like impurities, yellowness and brightness extract from images cotton, constructing model base least square method. Using support vector machine regression come up with well improved algorithm. After full learning, accuracy satisfy actual application needs.