Fan Dang

ORCID: 0000-0002-9949-6987
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Time Synchronization Technologies
  • IoT and Edge/Fog Computing
  • Real-Time Systems Scheduling
  • User Authentication and Security Systems
  • Indoor and Outdoor Localization Technologies
  • Internet Traffic Analysis and Secure E-voting
  • RFID technology advancements
  • Robotics and Sensor-Based Localization
  • Multimedia Communication and Technology
  • Image and Video Quality Assessment
  • UAV Applications and Optimization
  • Energy Efficient Wireless Sensor Networks
  • Robotic Path Planning Algorithms
  • Advanced Malware Detection Techniques
  • Video Coding and Compression Technologies
  • Human Mobility and Location-Based Analysis
  • Evacuation and Crowd Dynamics
  • Biometric Identification and Security
  • Air Quality Monitoring and Forecasting
  • Network Security and Intrusion Detection
  • Digital Rights Management and Security
  • Advanced Image Processing Techniques
  • Wireless Body Area Networks
  • Advanced Authentication Protocols Security
  • Smart Grid Energy Management

Beijing Jiaotong University
2025

Tsinghua University
2015-2024

Ion Exchange (India)
2024

Dalian Polytechnic University
2019

Dalian Institute of Chemical Physics
2019

Chinese Academy of Sciences
2019

Northwestern Polytechnical University
2019

Delivery drones provide a promising sensing platform for Mobile Crowdsensing (MCS) due to their high mobility and large-scale deployment. However, limited battery lifetime available resources, it is challenging schedule delivery derive both crowdsensing performance, which highly complicated optimization problem with several coupled decision variables. In this paper, we first formalize the scheduling as mixed-integer nonlinear programming utilities dual objectives. Then propose novel...

10.1145/3544793.3560412 article EN 2022-09-11

Mobile air pollution sensing methods are developed to collect quality data with higher spatial-temporal resolutions. However, existing cannot process the spatially mixed gas samples effectively due highly dynamic temporal and spatial fluctuations experienced by sensor, leading significant measurement deviations. We find an opportunity tackle problem exploring potential patterns from sensor measurements. In light of this, we propose MobiAir, a novel city-scale fine-grained estimation system...

10.1145/3643832.3661872 article EN cc-by-nc 2024-06-03

Multi-UAV systems have shown immense potential in handling complex tasks large-scale, dynamic, and cold-start (i.e., limited prior knowledge) scenarios, such as wildfire suppression. Due to the dynamic stochastic environmental conditions, scheduling for sensing fire monitoring) operation suppression) should be executed concurrently enable real-time information collection timely intervention of environment. However, planning inclinations are typically inconsistent evolve over time,...

10.1109/jiot.2024.3389771 article EN IEEE Internet of Things Journal 2024-04-16

With the wide adoption, Linux-based IoT devices have emerged as one primary target of today's cyber attacks. Traditional malware-based attacks can quickly spread across these devices, but they are well-understood threats with effective defense techniques such malware fingerprinting and community-based fingerprint sharing. Recently, fileless attacks---attacks that do not rely on files---have been increasing posing significant to security privacy systems. Little has known in terms their...

10.1145/3307334.3326083 article EN 2019-06-12

LoRa backscatter is a promising technology to achieve low-power and long-distance communication for connecting millions of devices in the Internet Things. We present P2LoRa, first ambient system with parallel decoding long-range communication. The high level idea P2LoRa modulate data by shifting packets small frequency. To long distance communication, we enhance SNR signal concentrating leaked energy both frequency domain time domain. propose method accurately reconstruct cancel in-band...

10.1145/3447993.3483261 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2021-10-25

10.1016/j.dsp.2021.103146 article EN publisher-specific-oa Digital Signal Processing 2021-06-21

RFID has been widely adopted as an effective method for anti-counterfeiting. Legacy systems based on security protocol are either too heavy to be affordable by passive tags or suffering from various protocol-layer attacks, e.g. reverse engineering, cloning, side-channel. In this work, we present a novel anti-counterfeiting system, TagPrint, using COTS and readers. Achieving low-cost offline genuineness validation utilizing daunting task. Our system achieves these three goals leveraging few...

10.1109/infocom.2015.7218580 article EN 2015-04-01

10.1007/s11432-024-4303-8 article EN cc-by Science China Information Sciences 2025-03-13

Emergency rescue scenarios are considered to be high-risk scenarios. Using a micro air vehicle (MAV) swarm explore the environment can provide valuable environmental information. However, due absence of localization infrastructure and limited on-board capabilities, it's challenging for low-cost MAV maintain precise localization. In this paper, collaborative system heterogeneous is proposed. This takes full advantage advanced effectively achieve accurate through collaboration. Subsequently,...

10.1145/3560905.3568432 article EN 2022-11-06

Time-Sensitive Networking (TSN) has been considered the most promising network paradigm for time-critical applications (e.g., industrial control) and traffic scheduling is core of TSN to ensure low latency determinism. With demand flexible production increases, topologies settings change frequently due pipeline switches. As a result, there pressing need more efficient algorithm. In this paper, we propose DeepScheduler, fast scalable flow-aware scheduler based on deep reinforcement learning....

10.1109/infocom53939.2023.10228875 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2023-05-17

Flexible manufacturing is one of the core goals Industry 4.0 and brings new challenges to current industrial control systems. Our detailed field study on auto glass industry revealed that existing production lines are laborious reconfigure, difficult upscale, costly upgrade during switching. Such inflexibility arises from tight coupling devices, controllers, tasks. In this work, we propose a architecture for systems named Control-as-a-Service (CaaS). CaaS transfers distributes tasks...

10.1109/infocom53939.2023.10228980 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2023-05-17

Time-Sensitive Networking (TSN) is the most promising network technology for Industry 4.0. A series of IEEE standards on TSN introduce deterministic transmission into standard Ethernet. Under current paradigm, can only schedule time-triggered critical traffic (TCT), neglecting other type in industrial cyber physical systems, i.e., event-triggered (ECT). So this work, we propose a new paradigm scheduling named E-TSN, which provide both TCT and ECT. The three techniques probabilistic stream,...

10.1109/icdcs54860.2022.00072 article EN 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS) 2022-07-01

Efforts to enhance the user experience (UX) of telepresence edge systems in various application scenarios have been significant. However, existing approaches tend focus on specific aspects, leaving us with a fragmented understanding UX quality. We address this gap by examining Video Conference Systems (VCSs) for remote collaboration, using an Information Theory Perspective as lens. introduce novel model quantify multimodality information users receive while engaged mobile office...

10.1109/tce.2024.3352240 article EN IEEE Transactions on Consumer Electronics 2024-01-01

This paper introduces a deep learning-based approach for calibrating hardware defects in physical-layer key generation (PKG) tasks, focusing on directional-of-arrival (DoA) based wireless communication systems. The proposed scheme leverages novel neural network architecture, incorporating residual and self-attention mechanisms, to accurately map spatial features under coherent signals, thereby significantly reducing bit mismatch rates inherent antenna array imperfections. Through extensive...

10.1145/3662007.3663883 article EN cc-by-nc-sa 2024-06-03

Automated Fare Collection (AFC) systems have been globally deployed for decades, particularly in the public transportation network where transit fee is calculated based on length of trip (a.k.a., distance-based pricing AFC systems). Although most messages are insecurely transferred plaintext, system operators did not pay much attention to this vulnerability, since basically isolated from (e.g., Internet)-there no way exploiting such a vulnerability outside network. Nevertheless, recent...

10.1109/tmc.2018.2853114 article EN IEEE Transactions on Mobile Computing 2018-07-05

Identification and tracking of multiple objects are essential in many applications. As a key enabler automatic ID technology, RFID has got widespread adoption with item-level tagging everyday life. However, restricted to the computation capability passive systems, locating or tags always been challenging task. Meanwhile, as fundamental problem field computer vision, object images progressed remarkable state especially rapid development deep learning past few years. To enable lightweight...

10.1109/infocom41043.2020.9155355 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

10.1007/s11390-023-2908-4 article EN Journal of Computer Science and Technology 2023-01-31

As the core of present blockchain applications, smart contracts are designed to help multiple parties reach an agreement. Along with promotion contract a large number economic losses caused by attacks on vulnerabilities have emerged. Since most only disclose bytecode, in recent years, there been numerous researches vulnerability detection mainly for Ethereum contracts, achieving considerable results. My survey summarizes methods and supported types these tools, aimed at or EOSIO, over years....

10.1109/iciscae51034.2020.9236931 article EN 2020-09-27

The widespread adoption and ubiquity of smart devices equipped with microphones (e.g., cellphones, smartwatches, etc.) unfortunately create many significant privacy risks. In recent years, there have been several cases people's conversations being secretly recorded, sometimes initiated by the device itself. Although some manufacturers are trying to protect users' privacy, best our knowledge, is not any effective technical solution available. this work, we present Patronus, a system that can...

10.1145/3384419.3430713 article EN 2020-11-16
Coming Soon ...