- Network Time Synchronization Technologies
- IoT and Edge/Fog Computing
- Real-Time Systems Scheduling
- User Authentication and Security Systems
- Indoor and Outdoor Localization Technologies
- Internet Traffic Analysis and Secure E-voting
- RFID technology advancements
- Robotics and Sensor-Based Localization
- Multimedia Communication and Technology
- Image and Video Quality Assessment
- UAV Applications and Optimization
- Energy Efficient Wireless Sensor Networks
- Robotic Path Planning Algorithms
- Advanced Malware Detection Techniques
- Video Coding and Compression Technologies
- Human Mobility and Location-Based Analysis
- Evacuation and Crowd Dynamics
- Biometric Identification and Security
- Air Quality Monitoring and Forecasting
- Network Security and Intrusion Detection
- Digital Rights Management and Security
- Advanced Image Processing Techniques
- Wireless Body Area Networks
- Advanced Authentication Protocols Security
- Smart Grid Energy Management
Beijing Jiaotong University
2025
Tsinghua University
2015-2024
Ion Exchange (India)
2024
Dalian Polytechnic University
2019
Dalian Institute of Chemical Physics
2019
Chinese Academy of Sciences
2019
Northwestern Polytechnical University
2019
Delivery drones provide a promising sensing platform for Mobile Crowdsensing (MCS) due to their high mobility and large-scale deployment. However, limited battery lifetime available resources, it is challenging schedule delivery derive both crowdsensing performance, which highly complicated optimization problem with several coupled decision variables. In this paper, we first formalize the scheduling as mixed-integer nonlinear programming utilities dual objectives. Then propose novel...
Mobile air pollution sensing methods are developed to collect quality data with higher spatial-temporal resolutions. However, existing cannot process the spatially mixed gas samples effectively due highly dynamic temporal and spatial fluctuations experienced by sensor, leading significant measurement deviations. We find an opportunity tackle problem exploring potential patterns from sensor measurements. In light of this, we propose MobiAir, a novel city-scale fine-grained estimation system...
Multi-UAV systems have shown immense potential in handling complex tasks large-scale, dynamic, and cold-start (i.e., limited prior knowledge) scenarios, such as wildfire suppression. Due to the dynamic stochastic environmental conditions, scheduling for sensing fire monitoring) operation suppression) should be executed concurrently enable real-time information collection timely intervention of environment. However, planning inclinations are typically inconsistent evolve over time,...
With the wide adoption, Linux-based IoT devices have emerged as one primary target of today's cyber attacks. Traditional malware-based attacks can quickly spread across these devices, but they are well-understood threats with effective defense techniques such malware fingerprinting and community-based fingerprint sharing. Recently, fileless attacks---attacks that do not rely on files---have been increasing posing significant to security privacy systems. Little has known in terms their...
LoRa backscatter is a promising technology to achieve low-power and long-distance communication for connecting millions of devices in the Internet Things. We present P2LoRa, first ambient system with parallel decoding long-range communication. The high level idea P2LoRa modulate data by shifting packets small frequency. To long distance communication, we enhance SNR signal concentrating leaked energy both frequency domain time domain. propose method accurately reconstruct cancel in-band...
RFID has been widely adopted as an effective method for anti-counterfeiting. Legacy systems based on security protocol are either too heavy to be affordable by passive tags or suffering from various protocol-layer attacks, e.g. reverse engineering, cloning, side-channel. In this work, we present a novel anti-counterfeiting system, TagPrint, using COTS and readers. Achieving low-cost offline genuineness validation utilizing daunting task. Our system achieves these three goals leveraging few...
Emergency rescue scenarios are considered to be high-risk scenarios. Using a micro air vehicle (MAV) swarm explore the environment can provide valuable environmental information. However, due absence of localization infrastructure and limited on-board capabilities, it's challenging for low-cost MAV maintain precise localization. In this paper, collaborative system heterogeneous is proposed. This takes full advantage advanced effectively achieve accurate through collaboration. Subsequently,...
Time-Sensitive Networking (TSN) has been considered the most promising network paradigm for time-critical applications (e.g., industrial control) and traffic scheduling is core of TSN to ensure low latency determinism. With demand flexible production increases, topologies settings change frequently due pipeline switches. As a result, there pressing need more efficient algorithm. In this paper, we propose DeepScheduler, fast scalable flow-aware scheduler based on deep reinforcement learning....
Flexible manufacturing is one of the core goals Industry 4.0 and brings new challenges to current industrial control systems. Our detailed field study on auto glass industry revealed that existing production lines are laborious reconfigure, difficult upscale, costly upgrade during switching. Such inflexibility arises from tight coupling devices, controllers, tasks. In this work, we propose a architecture for systems named Control-as-a-Service (CaaS). CaaS transfers distributes tasks...
Time-Sensitive Networking (TSN) is the most promising network technology for Industry 4.0. A series of IEEE standards on TSN introduce deterministic transmission into standard Ethernet. Under current paradigm, can only schedule time-triggered critical traffic (TCT), neglecting other type in industrial cyber physical systems, i.e., event-triggered (ECT). So this work, we propose a new paradigm scheduling named E-TSN, which provide both TCT and ECT. The three techniques probabilistic stream,...
Efforts to enhance the user experience (UX) of telepresence edge systems in various application scenarios have been significant. However, existing approaches tend focus on specific aspects, leaving us with a fragmented understanding UX quality. We address this gap by examining Video Conference Systems (VCSs) for remote collaboration, using an Information Theory Perspective as lens. introduce novel model quantify multimodality information users receive while engaged mobile office...
This paper introduces a deep learning-based approach for calibrating hardware defects in physical-layer key generation (PKG) tasks, focusing on directional-of-arrival (DoA) based wireless communication systems. The proposed scheme leverages novel neural network architecture, incorporating residual and self-attention mechanisms, to accurately map spatial features under coherent signals, thereby significantly reducing bit mismatch rates inherent antenna array imperfections. Through extensive...
Automated Fare Collection (AFC) systems have been globally deployed for decades, particularly in the public transportation network where transit fee is calculated based on length of trip (a.k.a., distance-based pricing AFC systems). Although most messages are insecurely transferred plaintext, system operators did not pay much attention to this vulnerability, since basically isolated from (e.g., Internet)-there no way exploiting such a vulnerability outside network. Nevertheless, recent...
Identification and tracking of multiple objects are essential in many applications. As a key enabler automatic ID technology, RFID has got widespread adoption with item-level tagging everyday life. However, restricted to the computation capability passive systems, locating or tags always been challenging task. Meanwhile, as fundamental problem field computer vision, object images progressed remarkable state especially rapid development deep learning past few years. To enable lightweight...
As the core of present blockchain applications, smart contracts are designed to help multiple parties reach an agreement. Along with promotion contract a large number economic losses caused by attacks on vulnerabilities have emerged. Since most only disclose bytecode, in recent years, there been numerous researches vulnerability detection mainly for Ethereum contracts, achieving considerable results. My survey summarizes methods and supported types these tools, aimed at or EOSIO, over years....
The widespread adoption and ubiquity of smart devices equipped with microphones (e.g., cellphones, smartwatches, etc.) unfortunately create many significant privacy risks. In recent years, there have been several cases people's conversations being secretly recorded, sometimes initiated by the device itself. Although some manufacturers are trying to protect users' privacy, best our knowledge, is not any effective technical solution available. this work, we present Patronus, a system that can...