- User Authentication and Security Systems
- Indoor and Outdoor Localization Technologies
- Advanced Malware Detection Techniques
- Ferroelectric and Piezoelectric Materials
- Video Surveillance and Tracking Methods
- Anomaly Detection Techniques and Applications
- Multiferroics and related materials
- Tactile and Sensory Interactions
- Digital Media Forensic Detection
- Microwave Dielectric Ceramics Synthesis
- Fuel Cells and Related Materials
- Statistical Methods and Bayesian Inference
- Context-Aware Activity Recognition Systems
- Autonomous Vehicle Technology and Safety
- Adversarial Robustness in Machine Learning
- IoT-based Smart Home Systems
- Identification and Quantification in Food
- Wireless Signal Modulation Classification
- Membrane-based Ion Separation Techniques
- Advanced Data Storage Technologies
- Electrocatalysts for Energy Conversion
- Advanced Authentication Protocols Security
- Food Supply Chain Traceability
- Human Mobility and Location-Based Analysis
- Advanced Sensor and Energy Harvesting Materials
Korea Advanced Institute of Science and Technology
2024-2025
Yonsei University
2011-2024
Shanghai Tenth People's Hospital
2023-2024
Tongji University
2005-2024
Korea Institute of Fusion Energy
2022
Beihang University
2022
National University of Singapore
2019-2021
Lanzhou Jiaotong University
2020
North China University of Technology
2019
Sichuan University
2016-2018
We show that accelerometer readings are a powerful side channel can be used to extract entire sequences of entered text on smart-phone touchscreen keyboard. This possibility is concern for two main reasons. First, unauthorized access one's keystrokes serious invasion privacy as consumers increasingly use smartphones sensitive transactions. Second, unlike many other sensors found smartphones, the does not require special privileges current smartphone OSes. measurements 6-character passwords...
The security and privacy risks posed by smartphone sensors such as microphones cameras have been well documented. However, the importance of accelerometers largely ignored. We show that accelerometer readings can be used to infer trajectory starting point an individual who is driving. This raises concerns for two main reasons. First, unauthorized access individual's location a serious invasion security. Second, current operating systems allow any application observe without requiring special...
Context-based pairing solutions increase the usability of IoT device by eliminating any human involvement in process. This is possible utilizing on-board sensors (with same sensing modalities) to capture a common physical context (e.g., ambient sound via each device's microphone). However, smart home scenario, it impractical assume that all devices will share modality. For example, motion detector only equipped with an infrared sensor while Amazon Echo has microphones. In this paper, we...
Vehicular mobile crowdsensing (MCS) enables many smart city applications. Ridesharing vehicle fleets provide promising solutions to MCS due the advantages of low cost, easy maintenance, high mobility, and long operational time. However, as nondedicated sensing platforms, first priorities these vehicles are delivering passengers, which may lead poor coverage quality. Therefore, help derive good (large balanced) quality, an actuation system is required dispatch with a limited amount monetary...
Eavesdropping on private conversations is one of the most common yet detrimental threats to privacy. A number recent works have explored side-channels smart devices for recording sounds without permission. This paper presents LidarPhone, a novel acoustic side-channel attack through lidar sensors equipped in popular commodity robot vacuum cleaners. The core idea repurpose laser-based microphone that can sense from subtle vibrations induced nearby objects. LidarPhone carefully processes and...
Despite the advent of numerous Internet-of-Things (IoT) applications, recent research demonstrates potential side-channel vulnerabilities exploiting sensors which are used for event and environment monitoring. In this paper, we propose a new attack, where network distributed non-acoustic can be exploited by an attacker to launch eavesdropping attack reconstructing intelligible speech signals. Specifically, present PitchIn demonstrate feasibility reconstruction from sensor data collected...
The rise in popularity of powdered food products, from dietary supplements to specialized nutritional formulas, is driven by their convenience, cost-effectiveness, and long shelf life. For instance, infant formula, often available form, especially important as it designed serve a substitute for breast milk. As result these benefits, the global demand formula projected grow significantly, with market value expected reach approximately 174 billion 2032 [1].
Truck platooning is emerging as a promising solution with many economic incentives. However, securely admitting new vehicle into platoon an extremely important yet difficult task. There no adequate method today for verifying physical arrangements of vehicles within formation. Specifically, we address the problem ghost attack wherein attacker spoofs presence to gain admission and subsequently execute malicious attacks. To such concerns, present Convoy, novel autonomous scheme which binds...
Abstract Tuning the bandgap in ferroelectric complex oxides is a possible route for improving photovoltaic activity of materials. Here, we report realization this effect epitaxial thin films oxide Bi 3.25 La 0.75 Ti 3 O 12 (BLT) suitably doped by Fe and Co. Our study shows that Co (BLCT) doping combined Fe, (BLFCT) lead to reduction more than 1 eV compared undoped BLT, accompanied surprisingly efficient visible light absorption. Both BLCT BLFCT can absorb with wavelength up 500 nm while...
Indoor emergency response situations, such as urban fire, are characterized by dangerous constantly changing operating environments with little access to situational information for first responders. In situ about the conditions, extent and evolution of an indoor can augment rescue efforts reduce risk personnel. Static sensor networks that pre-deployed or manually deployed have been proposed but less practical due need large infrastructure, lack adaptivity, limited coverage....
Easily establishing pairing between Internet-of-Things (IoT) devices is important for fast deployment in many smart home scenarios. Traditional methods, including passkey, QR code, and RFID, often require specific user interfaces, surface's shape/material, or additional tags/readers. The growing number of low-resource IoT without an interface may not meet these requirements, which makes their a challenge. On the other hand, already have sensors embedded sensing tasks, such as inertial...
Abstract A joint model for a longitudinal biomarker and recurrent events is proposed. This general accommodates the effects of covariates on event processes, accumulating occurrences, caused by interventions after each occurrence. Association between processes captured through latent class structure, which also serves to handle an underlying heterogeneous population. We use EM algorithm maximum likelihood estimation parameters penalized measure determine number classes. validated simulation...
Accurate detection of falls leading to injury is essential for providing timely medical assistance. In this paper, we describe a wireless sensor network system automatic fall detection. To detect falls, use combination body- worn triaxial accelerometer with motion detectors placed in the monitored area. While provides information about body during fall, monitor general presence or absence motion. From all sensors, data transmitted wirelessly using IEEE 802.15.4 protocol central node...
Occupant identification proves crucial in many smart home applications such as automated control and activity recognition. Previous solutions are limited terms of deployment costs, accuracy, or usability. We propose SenseTribute , a novel occupant solution that makes use existing prevalent on-object sensors originally designed to monitor the status objects which they attached. extracts richer information content from analyzes data accurately identify person interacting with objects. This...
Drones are gaining a lot of traction in wide spectrum applications. This popularity makes them attractive attack surfaces, which necessitates the need for ensuring their security. Specifically, case drone delivery, an attacker may impersonate legitimate one order to steal packages, authentication important. Recent efforts have pushed incorporate digital certificates as authenticator drones. However, such software-based techniques often compromised and can be launched on large scale, making...
GPU cryptojacking is an attack that hijacks resources of victims for cryptocurrency mining. Such becoming emerging threat to both local hosts and cloud platforms. These attacks result in huge economic losses the due significant power consumption by cryptomining applications. Unfortunately, there are no adequate solutions detect such attacks. In this paper, we propose MagTracer, a novel detection system leverages magnetic leakage signals emanating from GPUs. We make key observation GPUs...
ABSTRACT The purpose of this study is to develop new cardo‐polybenzimidazole (CPBI) copolymers containing cardo fluorene, with improved gas permeability, specifically oxygen permeability. characteristics these are investigated by Fourier transform infrared spectroscopy, nuclear magnetic resonance, 1 H and 13 C), thermo‐gravimetric analysis, wide‐angle X‐ray diffraction. These membranes fabricated from have relatively high diffusion coefficients, determined using permeation. In particular,...