Wei Wang

ORCID: 0000-0003-3240-1485
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Networks and Protocols
  • Network Security and Intrusion Detection
  • Indoor and Outdoor Localization Technologies
  • Cooperative Communication and Network Coding
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Energy Efficient Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • Electric Vehicles and Infrastructure
  • User Authentication and Security Systems
  • Advanced Battery Technologies Research
  • Spam and Phishing Detection
  • Advanced MIMO Systems Optimization
  • Cloud Computing and Resource Management
  • Security in Wireless Sensor Networks
  • Full-Duplex Wireless Communications
  • Internet Traffic Analysis and Secure E-voting
  • Energy Harvesting in Wireless Networks
  • IoT-based Smart Home Systems
  • Information and Cyber Security
  • Higher Education and Teaching Methods
  • Wireless Communication Security Techniques
  • Anomaly Detection Techniques and Applications
  • Distributed and Parallel Computing Systems
  • Caching and Content Delivery

Wuhan University of Technology
2010-2025

Nanjing University
2014-2024

Southwest University of Science and Technology
2024

Saint Louis University
2023-2024

PLA Information Engineering University
2024

State Grid Corporation of China (China)
2024

Zhongnan University of Economics and Law
2023

Chinese Academy of Sciences
2009-2022

Shenyang Institute of Computing Technology (China)
2022

Chang'an University
2022

Some pioneer WiFi signal based human activity recognition systems have been proposed. Their key limitation lies in the lack of a model that can quantitatively correlate CSI dynamics and activities. In this paper, we propose CARM, Activity Recognition Monitoring system. CARM has two theoretical underpinnings: CSI-speed model, which quantifies correlation between value movement speeds, CSI-activity speeds different body parts specific activity. By these models, build uses as profiling...

10.1145/2789168.2790093 article EN 2015-08-27

Keystroke privacy is critical for ensuring the security of computer systems and human users as what being typed could be passwords or sensitive information. In this paper, we show first time that WiFi signals can also exploited to recognize keystrokes. The intuition while typing a certain key, hands fingers user move in unique formation direction thus generate pattern time-series Channel State Information (CSI) values, which call CSI-waveform key. propose signal based keystroke recognition...

10.1145/2789168.2790109 article EN 2015-08-27

Web service is one of the key communications software services for Internet. phishing many security threats to web on aims steal private information, such as usernames, passwords, and credit card details, by way impersonating a legitimate entity. It will lead information disclosure property damage. This paper mainly focuses applying deep learning framework detect websites. first designs two types features phishing: original interaction features. A detection model based Deep Belief Networks...

10.1155/2018/4678746 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

Keystroke privacy is critical for ensuring the security of computer systems and human users as what being typed could be passwords or sensitive information. In this paper, we show first time that WiFi signals can also exploited to recognize keystrokes. The intuition while typing a certain key, hands fingers user move in unique formation direction thus generate pattern time-series channel state information (CSI) values, which call CSI-waveform key. propose signal-based keystroke recognition...

10.1109/jsac.2017.2680998 article EN publisher-specific-oa IEEE Journal on Selected Areas in Communications 2017-03-10

An approach to smoothing the fluctuations of large-scale wind power is investigated using vehicle-to-grid (V2G) systems. First, an energy management and optimization system designed modeled. By wavelet packet decomposition method, target grid-connected power, required electric vehicle (EV) supercapacitor are determined. The model for EVs then developed by introducing a knapsack problem that can evaluate needs EV fleet. Furthermore, optimized dispatch strategy dynamic programming method. A...

10.17775/cseejpes.2020.01610 article EN cc-by-nc-nd CSEE Journal of Power and Energy Systems 2020-01-01

Large fluctuations may occur on the energy supply and load sides when large-scale renewable energies are integrated, leading to great challenges in power systems. The curtailment is especially numerous integrated electricity-heat system (IEHES) account of coupling. flexible resources (FRs) both introduced into optimal dispatch IEHES further modeled alleviate this paper. On side, three kinds FRs based coordination discussed. shiftable electricity demand resource characterized. basis, solution...

10.35833/mpce.2020.000917 article EN Journal of Modern Power Systems and Clean Energy 2021-01-01

To support ubiquitous computing for various applications (such as smart health, homes, and cities), the communication system requires to be ubiquitously available, ultra-low-power, high throughput, low-latency. A passive such backscatter is desirable. However, existing systems cannot achieve all of above requirements. In this paper, we present first LTE (LScatter) that leverages continuous ambient traffic ubiquitous, throughput low latency communication. Our design motivated by our...

10.1145/3387514.3405861 article EN 2020-07-30

The camera is one of the most important sensors for an autonomous vehicle (AV) to perform Environment Perception and Simultaneous Localization Mapping (SLAM). To secure camera, current vehicles not only utilize data gathered from multiple (e.g., Camera, Ultrasonic Sensor, Radar, or LiDAR) environment perception SLAM but also require human driver always realize driving situation, which can effectively defend against previous attack approaches (i.e., creating visible fake objects introducing...

10.1145/3460120.3484766 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

When high-temperature geothermal conditions occur within road tunnels, the safety of emergency exits becomes more challenging, especially in cases fire. The high background temperature increases speed smoke stratification process, and therefore, is unfavorable for people rescue evacuation. In China, longitudinal ventilation systems are widely used to control tunnels during fire events help ensure This paper aims evaluate performance system when applied a tunnel. results show that tunnel will...

10.54254/2753-8818/2025.20304 article EN cc-by Theoretical and Natural Science 2025-01-15

Objective This study aimed to evaluate the effectiveness of a virtual reality (VR)-based training program in improving emergency physicians’ ability manage multi-casualty traffic injuries, compared conventional methods. Methods A randomized controlled trial was conducted with 76 physicians from single hospital. Participants were randomly assigned either VR group (n = 38) or control 38). The underwent immersive using simulation accidents, while received traditional lectures and...

10.3389/frvir.2025.1518016 article EN cc-by Frontiers in Virtual Reality 2025-02-26

Nowadays, the growing demand for 3D human-computer interaction (HCI) has brought about a number of novel approaches, which achieve HCI by tracking motion different devices, including translation and rotation. In this paper, we propose to use spinning linearly polarized antenna track specified object attached with passive RFID tag array. Different from fixed antenna-based solutions, suffer unavoidable signal interferences at some specific positions/orientations, only good performance in...

10.1109/infocom.2019.8737372 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

This study explores the potential of renewable power to meet load demand in China. The complementarity for matching (LM-complementarity) is defined firstly. Kendall's correlation employed quantify LM-complementarity. Then characteristics on hourly and daily time scales are analyzed. Results reveal that increasing distance between interconnected plants has weak improvements LM-complementarity most cases. wind solar superior or generated different regions. can be effectively met by power....

10.1109/tste.2021.3131560 article EN IEEE Transactions on Sustainable Energy 2021-12-01

In this paper, we show that it is feasible for a mobile phone to be used as an SOS beacon in aerial search and rescue operation. We with various experiments can reliably detect WiFi-enabled phones from the air at distances up 200 m. By using custom application triggers WiFi scanning display off, simultaneously extend battery life increase frequency, compared keeping default mode. Even if not installed or used, our measurement study suggests may possible devices their background emissions alone.

10.1145/2500727.2500729 article EN 2013-07-29

Recent advances in cross-technology communication have significantly improved the spectrum efficiency same ISM band among heterogeneous wireless devices (e.g., WiFi and ZigBee). However, further performance improvement whole network is hampered because layer missing. As first design, our work, named ECT, opens a promising direction for reducing packet delivery delay via collaborative concurrent between ZigBee devices. Specifically, ECT can dynamically change nodes' priorities reduce from...

10.1109/infocom.2018.8486349 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

The password has become today's dominant method of authentication. While brute-force attack methods such as HashCat and John the Ripper have proven unpractical, research then switches to guessing. State-of-the-art approaches Markov Model probabilistic context-free grammar (PCFG) are all based on statistical probability. These require a large amount calculation, which is time-consuming. Neural networks more accurate practical in guessing than traditional methods. However, raw neural network...

10.1109/tmm.2019.2940877 article EN cc-by IEEE Transactions on Multimedia 2019-09-11

Password has become today's dominant method of authentication in social network. While the brute-force attack methods, such as HashCat and John Ripper, are unpractical, research then switches to password guess. The state-of-the-art approaches, Markov Model probabilistic context-free grammars(PCFG), all based on statistical probability. These approaches have a low matching rate. methods neural network been proved more accurate practical for guessing than traditional methods. However, raw...

10.1109/icc.2018.8422243 article EN 2018-05-01

The exponentially increasing number of Internet-of-Thing (IoT) devices introduces a spectrum crisis in the shared ISM band. However, it also opportunities for conducting radio frequency (RF) sensing using pervasively available signals generated by heterogeneous IoT devices. In this paper, we explore how to leverage ambient wireless traffic that i) uncontrollable and ii sensed noise floor measurements (a widely metric devices) human gesture recognition. Specifically, introduce our system EAR,...

10.1145/3274783.3274847 article EN 2018-10-26

Extracting attributes from network traffic is the first step of intrusion detection. However, question what are most effective for detection still remains. In this paper, we employed information gain, wrapper with Bayesian networks (BN) and decision trees (C4.5) respectively to select key subsets based on KDD Cup 1999 data. We then used selected 10 detect DDoS attacks in real environments. The empirical results data as well attack show that only using attributes, accuracy almost remains same...

10.1109/icimp.2008.13 preprint EN 2008-01-01

DDoS attacks are major threats in current computer networks. However, difficult to be quickly detected. In this paper, we introduce a system that only extracts several important attributes from network traffic for attack detection real We collect large set of by implementing various as well normal data during usage. Information Gain and Chi-square methods used rank the importance 41 extracted with our programs. Bayesian networks C4.5 then employed detect determine what size is appropriate...

10.1109/crisis.2008.4757464 preprint EN 2008-10-01

Routing and flooding are important functions in wireless networks. However, until now routing protocols investigated separately within the same network (i.e., a WiFi or ZigBee network). Moreover, further performance improvement has been hampered by assumption of harmful cross technology interference. In this paper, we present coexistent (CRF), which leverages unique feature physical layer cross-technology communication technique for concurrently conducting among nodes using single stream...

10.1109/infocom.2019.8737525 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

Researchers have demonstrated the feasibility of detecting human motion behind wall with radio frequency (RF) sensing techniques. With these techniques, an eavesdropper can monitor people's behavior from outside room without need to access room. This introduces a severe privacy-leakage issue. To address this issue, we propose Aegis, interference-negligible RF shield that i) incapacitates eavesdroppers work at any unknown locations protected area; ii) has minimum interference ongoing WiFi...

10.1109/infocom.2018.8485883 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

Cellular network operators deploy base stations with a high density to ensure radio signal coverage for 4G/5G networks. While users enjoy the high-speed connection provided by cellular networks, an adversary could exploit dense deployment detect nearby human movements and even recognize keystroke of victim passively listening CRS broadcast from stations. To demonstrate this, we develop SpiderMon, first attempt perform passive continuous monitoring using transmitted commercial Our...

10.1109/infocom41043.2020.9155447 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

E-commerce systems are typically QoS-sensitive, so QoS-oriented tunings of e-commerce servers very important for such systems. However, existing benchmarks insufficient supporting tunings, because some critical QoS features cannot be precisely evaluated by them. One example these is the integrality service, which usually expressed as a session, provided to customers. This paper presents benchmark, named Bench4Q and an extension TPC-W tuning servers. The main include: (1) session-based...

10.1109/compsac.2011.14 article EN 2011-07-01
Coming Soon ...