- Wireless Networks and Protocols
- Network Security and Intrusion Detection
- Indoor and Outdoor Localization Technologies
- Cooperative Communication and Network Coding
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Energy Efficient Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Electric Vehicles and Infrastructure
- User Authentication and Security Systems
- Advanced Battery Technologies Research
- Spam and Phishing Detection
- Advanced MIMO Systems Optimization
- Cloud Computing and Resource Management
- Security in Wireless Sensor Networks
- Full-Duplex Wireless Communications
- Internet Traffic Analysis and Secure E-voting
- Energy Harvesting in Wireless Networks
- IoT-based Smart Home Systems
- Information and Cyber Security
- Higher Education and Teaching Methods
- Wireless Communication Security Techniques
- Anomaly Detection Techniques and Applications
- Distributed and Parallel Computing Systems
- Caching and Content Delivery
Wuhan University of Technology
2010-2025
Nanjing University
2014-2024
Southwest University of Science and Technology
2024
Saint Louis University
2023-2024
PLA Information Engineering University
2024
State Grid Corporation of China (China)
2024
Zhongnan University of Economics and Law
2023
Chinese Academy of Sciences
2009-2022
Shenyang Institute of Computing Technology (China)
2022
Chang'an University
2022
Some pioneer WiFi signal based human activity recognition systems have been proposed. Their key limitation lies in the lack of a model that can quantitatively correlate CSI dynamics and activities. In this paper, we propose CARM, Activity Recognition Monitoring system. CARM has two theoretical underpinnings: CSI-speed model, which quantifies correlation between value movement speeds, CSI-activity speeds different body parts specific activity. By these models, build uses as profiling...
Keystroke privacy is critical for ensuring the security of computer systems and human users as what being typed could be passwords or sensitive information. In this paper, we show first time that WiFi signals can also exploited to recognize keystrokes. The intuition while typing a certain key, hands fingers user move in unique formation direction thus generate pattern time-series Channel State Information (CSI) values, which call CSI-waveform key. propose signal based keystroke recognition...
Web service is one of the key communications software services for Internet. phishing many security threats to web on aims steal private information, such as usernames, passwords, and credit card details, by way impersonating a legitimate entity. It will lead information disclosure property damage. This paper mainly focuses applying deep learning framework detect websites. first designs two types features phishing: original interaction features. A detection model based Deep Belief Networks...
Keystroke privacy is critical for ensuring the security of computer systems and human users as what being typed could be passwords or sensitive information. In this paper, we show first time that WiFi signals can also exploited to recognize keystrokes. The intuition while typing a certain key, hands fingers user move in unique formation direction thus generate pattern time-series channel state information (CSI) values, which call CSI-waveform key. propose signal-based keystroke recognition...
An approach to smoothing the fluctuations of large-scale wind power is investigated using vehicle-to-grid (V2G) systems. First, an energy management and optimization system designed modeled. By wavelet packet decomposition method, target grid-connected power, required electric vehicle (EV) supercapacitor are determined. The model for EVs then developed by introducing a knapsack problem that can evaluate needs EV fleet. Furthermore, optimized dispatch strategy dynamic programming method. A...
Large fluctuations may occur on the energy supply and load sides when large-scale renewable energies are integrated, leading to great challenges in power systems. The curtailment is especially numerous integrated electricity-heat system (IEHES) account of coupling. flexible resources (FRs) both introduced into optimal dispatch IEHES further modeled alleviate this paper. On side, three kinds FRs based coordination discussed. shiftable electricity demand resource characterized. basis, solution...
To support ubiquitous computing for various applications (such as smart health, homes, and cities), the communication system requires to be ubiquitously available, ultra-low-power, high throughput, low-latency. A passive such backscatter is desirable. However, existing systems cannot achieve all of above requirements. In this paper, we present first LTE (LScatter) that leverages continuous ambient traffic ubiquitous, throughput low latency communication. Our design motivated by our...
The camera is one of the most important sensors for an autonomous vehicle (AV) to perform Environment Perception and Simultaneous Localization Mapping (SLAM). To secure camera, current vehicles not only utilize data gathered from multiple (e.g., Camera, Ultrasonic Sensor, Radar, or LiDAR) environment perception SLAM but also require human driver always realize driving situation, which can effectively defend against previous attack approaches (i.e., creating visible fake objects introducing...
When high-temperature geothermal conditions occur within road tunnels, the safety of emergency exits becomes more challenging, especially in cases fire. The high background temperature increases speed smoke stratification process, and therefore, is unfavorable for people rescue evacuation. In China, longitudinal ventilation systems are widely used to control tunnels during fire events help ensure This paper aims evaluate performance system when applied a tunnel. results show that tunnel will...
Objective This study aimed to evaluate the effectiveness of a virtual reality (VR)-based training program in improving emergency physicians’ ability manage multi-casualty traffic injuries, compared conventional methods. Methods A randomized controlled trial was conducted with 76 physicians from single hospital. Participants were randomly assigned either VR group (n = 38) or control 38). The underwent immersive using simulation accidents, while received traditional lectures and...
Nowadays, the growing demand for 3D human-computer interaction (HCI) has brought about a number of novel approaches, which achieve HCI by tracking motion different devices, including translation and rotation. In this paper, we propose to use spinning linearly polarized antenna track specified object attached with passive RFID tag array. Different from fixed antenna-based solutions, suffer unavoidable signal interferences at some specific positions/orientations, only good performance in...
This study explores the potential of renewable power to meet load demand in China. The complementarity for matching (LM-complementarity) is defined firstly. Kendall's correlation employed quantify LM-complementarity. Then characteristics on hourly and daily time scales are analyzed. Results reveal that increasing distance between interconnected plants has weak improvements LM-complementarity most cases. wind solar superior or generated different regions. can be effectively met by power....
In this paper, we show that it is feasible for a mobile phone to be used as an SOS beacon in aerial search and rescue operation. We with various experiments can reliably detect WiFi-enabled phones from the air at distances up 200 m. By using custom application triggers WiFi scanning display off, simultaneously extend battery life increase frequency, compared keeping default mode. Even if not installed or used, our measurement study suggests may possible devices their background emissions alone.
Recent advances in cross-technology communication have significantly improved the spectrum efficiency same ISM band among heterogeneous wireless devices (e.g., WiFi and ZigBee). However, further performance improvement whole network is hampered because layer missing. As first design, our work, named ECT, opens a promising direction for reducing packet delivery delay via collaborative concurrent between ZigBee devices. Specifically, ECT can dynamically change nodes' priorities reduce from...
The password has become today's dominant method of authentication. While brute-force attack methods such as HashCat and John the Ripper have proven unpractical, research then switches to guessing. State-of-the-art approaches Markov Model probabilistic context-free grammar (PCFG) are all based on statistical probability. These require a large amount calculation, which is time-consuming. Neural networks more accurate practical in guessing than traditional methods. However, raw neural network...
Password has become today's dominant method of authentication in social network. While the brute-force attack methods, such as HashCat and John Ripper, are unpractical, research then switches to password guess. The state-of-the-art approaches, Markov Model probabilistic context-free grammars(PCFG), all based on statistical probability. These approaches have a low matching rate. methods neural network been proved more accurate practical for guessing than traditional methods. However, raw...
The exponentially increasing number of Internet-of-Thing (IoT) devices introduces a spectrum crisis in the shared ISM band. However, it also opportunities for conducting radio frequency (RF) sensing using pervasively available signals generated by heterogeneous IoT devices. In this paper, we explore how to leverage ambient wireless traffic that i) uncontrollable and ii sensed noise floor measurements (a widely metric devices) human gesture recognition. Specifically, introduce our system EAR,...
Extracting attributes from network traffic is the first step of intrusion detection. However, question what are most effective for detection still remains. In this paper, we employed information gain, wrapper with Bayesian networks (BN) and decision trees (C4.5) respectively to select key subsets based on KDD Cup 1999 data. We then used selected 10 detect DDoS attacks in real environments. The empirical results data as well attack show that only using attributes, accuracy almost remains same...
DDoS attacks are major threats in current computer networks. However, difficult to be quickly detected. In this paper, we introduce a system that only extracts several important attributes from network traffic for attack detection real We collect large set of by implementing various as well normal data during usage. Information Gain and Chi-square methods used rank the importance 41 extracted with our programs. Bayesian networks C4.5 then employed detect determine what size is appropriate...
Routing and flooding are important functions in wireless networks. However, until now routing protocols investigated separately within the same network (i.e., a WiFi or ZigBee network). Moreover, further performance improvement has been hampered by assumption of harmful cross technology interference. In this paper, we present coexistent (CRF), which leverages unique feature physical layer cross-technology communication technique for concurrently conducting among nodes using single stream...
Researchers have demonstrated the feasibility of detecting human motion behind wall with radio frequency (RF) sensing techniques. With these techniques, an eavesdropper can monitor people's behavior from outside room without need to access room. This introduces a severe privacy-leakage issue. To address this issue, we propose Aegis, interference-negligible RF shield that i) incapacitates eavesdroppers work at any unknown locations protected area; ii) has minimum interference ongoing WiFi...
Cellular network operators deploy base stations with a high density to ensure radio signal coverage for 4G/5G networks. While users enjoy the high-speed connection provided by cellular networks, an adversary could exploit dense deployment detect nearby human movements and even recognize keystroke of victim passively listening CRS broadcast from stations. To demonstrate this, we develop SpiderMon, first attempt perform passive continuous monitoring using transmitted commercial Our...
E-commerce systems are typically QoS-sensitive, so QoS-oriented tunings of e-commerce servers very important for such systems. However, existing benchmarks insufficient supporting tunings, because some critical QoS features cannot be precisely evaluated by them. One example these is the integrality service, which usually expressed as a session, provided to customers. This paper presents benchmark, named Bench4Q and an extension TPC-W tuning servers. The main include: (1) session-based...