- Indoor and Outdoor Localization Technologies
- Wireless Networks and Protocols
- Complex Network Analysis Techniques
- Spam and Phishing Detection
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Peer-to-Peer Network Technologies
- Speech and Audio Processing
- Opinion Dynamics and Social Influence
- Sentiment Analysis and Opinion Mining
- Millimeter-Wave Propagation and Modeling
- Recommender Systems and Techniques
- Underwater Vehicles and Communication Systems
Harbin Engineering University
2014-2016
Tianjin University of Technology
2016
With the rapid development of WLAN technology, wireless device-free passive human detection becomes a newly-developing technique and holds more potential to worldwide ubiquitous smart applications. Recently, indoor fine-grained motion based on PHY layer information is rapidly developed. Previous systems either rely deploying specialized with dense transmitter-receiver links or elaborate off-line training process, which blocks deployment weakens system robustness. In paper, we explore...
Intrusion detection plays a critical role in security of people's possessions. Approaches such as video-based, infrared-based, RFID, UWB, etc. can provide satisfying accuracy. However, they all require specialized hardware deployment and strict using conditions which hinder their wide deployment. Beyond communication, WLANs also act generalized sensor networks there are several researches working on motion via WLAN due to its advantages flexibility, coverage, cost efficiency. Nevertheless,...
Device-free passive localization (DFPL) has been an emerging application with fast increasing development. Channel State Information- (CSI-) based DFPL is recently paid more attention to for fine-granularity and stability of CSI. However, lots dead spots exist in the area interest. And accuracy not still completely satisfactory, especially outside first Fresnel zone. In our paper, we put forward a new metric estimate sensitivity receiver changes detecting area. experiment, observe that...
We study a new influence maximization problem about how to find seed set which can maximize the spread targeted user group in microblogging. To solve this problem, we propose threestage User greedy algorithm (UGGreedy) based on attributes. reduce network scale, delete useless nodes, and rank rest of users attributes form candidate set. employ construct simplified microblogging graph. novel accumulation Experimental results show that UGGreedy achieve remarkable efficiency for real networks.
Abstract — Microblog has emerged as a popularmedium for providing new sources of information and rapidcommunications, particularly during burst topics. Burstkeywords detection from real-time microblog streams is im-portant topics detection. The exiting algorithmsmay detect fake keywords without taking into ac-count the trustworthiness users human’s dailytimetable. Our work first to combine trustwor-thiness with Wepropose novel approach basedon social trust dynamics model. We adapt basic...
Passive indoor localisation acts as a key enabler for various emerging applications such secured region monitoring, smart homes, intelligent nursing, etc. Despite of years research, their accuracy still remains unsatisfactory practical uses. The main hurdle lies in the coarse measurement wireless channels, e.g., received signal strength indicator (RSSI), employed most existing schemes. In this work, we explore potential using channel state information (CSI) fine-grained passive on single...