Zhiping Jiang

ORCID: 0000-0003-3711-870X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Indoor and Outdoor Localization Technologies
  • RFID technology advancements
  • Underwater Vehicles and Communication Systems
  • Wireless Networks and Protocols
  • Speech and Audio Processing
  • Terahertz technology and applications
  • Mobile Crowdsensing and Crowdsourcing
  • Energy Efficient Wireless Sensor Networks
  • Internet Traffic Analysis and Secure E-voting
  • Caching and Content Delivery
  • Photonic and Optical Devices
  • Millimeter-Wave Propagation and Modeling
  • Business Process Modeling and Analysis
  • Ultra-Wideband Communications Technology
  • Spectroscopy and Laser Applications
  • Petri Nets in System Modeling
  • User Authentication and Security Systems
  • Context-Aware Activity Recognition Systems
  • Advanced Photonic Communication Systems
  • Bluetooth and Wireless Communication Technologies
  • Service-Oriented Architecture and Web Services
  • Network Security and Intrusion Detection
  • Web Data Mining and Analysis
  • Financial Markets and Investment Strategies
  • Recommender Systems and Techniques

Xidian University
2018-2024

Huawei Technologies (Canada)
2021-2024

Central South University
2022

Soochow University
2022

First Affiliated Hospital of Soochow University
2022

National Clinical Research Center for Digestive Diseases
2022

Xiangya Hospital Central South University
2022

Sichuan Normal University
2019

Institute of Software
2018

Xi'an Jiaotong University
2012-2017

Crowd counting, which count or accurately estimate the number of human beings within a region, is critical in many applications, such as guided tour, crowd control and marketing research analysis. A counting solution should be scalable minimally intrusive (i.e., device-free) to users. Image-based solutions are device-free, but cannot work well dim dark environment. Non-image based usually require every being carrying device, inaccurate unreliable practice. In this paper, we present FCC,...

10.1109/infocom.2014.6847958 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

Device-free object tracking provides a promising solution for many localization and systems to monitor non-cooperative objects, such as intruders, which do not carry any transceiver. However, existing device-free solutions mainly use special sensors or active RFID tags, are much more expensive compared passive tags. In this paper, we propose novel motion detection method using named Twins. The leverages newly observed phenomenon called critical state caused by interference among We...

10.1109/tnet.2015.2429657 article EN IEEE/ACM Transactions on Networking 2015-05-25

Physical-layer identification utilizes unique features of wireless devices as their fingerprints, providing authenticity and security guarantee. Prior physical-layer techniques on radio frequency (RFID) tags require nongeneric equipments are not fully compatible with existing standards. In this paper, we propose a novel system, GenePrint, for UHF passive tags. The GenePrint prototype system is implemented by commercial reader, USRP-based monitor, off-the-shelf Our solution generic completely...

10.1109/tnet.2015.2391300 article EN IEEE/ACM Transactions on Networking 2015-02-03

The research on Wi-Fi sensing has been thriving over the past decade but process not smooth. Three barriers always hamper research: 1) unknown baseband design and its influence; 2) inadequate hardware; 3) lack of versatile flexible measurement software. This article tries to eliminate these through following work. <i>First</i>, we present an in-depth study Qualcomm Atheros AR9300 (QCA9300) NIC. We identify a missing item existing channel state information (CSI) model, namely, CSI distortion,...

10.1109/jiot.2021.3104666 article EN IEEE Internet of Things Journal 2021-08-17

The rapid increase of the data user behaviors on Internet brings a promising chance to better discover preferences. Recommender systems have become popular tool for discovery One key issue is how employ behavior sequences develop effective sequential recommendations, especially when are biased. current recommendation methods either can only mine dependencies but ignores bias or learn cannot dependencies. To solve these problems, in this article, we propose neural collaborative learning...

10.1109/tcss.2023.3268682 article EN IEEE Transactions on Computational Social Systems 2023-05-02

We present a theoretical model and preliminary experimental results on the dielectric constant measurement of thin films by using differential time-domain spectroscopy. This technique greatly reduces minimum measurable thickness, it promises μm-thick with frequency range from GHz to THz.

10.1063/1.126587 article EN Applied Physics Letters 2000-05-29

Comparing to well protected data frames, Wi-Fi management frames (MFs) are extremely vulnerable various attacks. Since MFs transmitted without encryption or authentication, attackers can easily launch attacks by forging the MFs. In a collaborative environment with many sniffers, such be detected sensing anomaly RSS changes. However, it is quite difficult identify these spoofing assistance from other nodes. By exploiting some unique characteristics (e.g., rapid spatial decorrelation,...

10.1109/infcom.2013.6567061 preprint EN 2013-04-01

Different from online shopping, in-store shopping has few ways to collect the customer behaviors before purchase. In this paper, we present design and implementation of an on-site Customer Behavior IDentification system based on passive RFID tags, named CBID. By collecting analyzing wireless signal features, CBID can detect track tag movements further infer corresponding behaviors. We model three main objectives behavior identification by concrete problems solve them using novel protocols...

10.1109/tnet.2015.2501103 article EN IEEE/ACM Transactions on Networking 2015-12-02

Device-free based object tracking provides a promising solution for many localization and systems to monitor non-cooperative objects which do not carry any transceiver such as intruders. However, existing device-free solutions mainly use sensors active RFID tags, are much more expensive compared passive tags. In this paper, we propose novel motion detection method using named Twins. The leverages phenomenon called critical state caused by interference among We theoretically explain via an...

10.1109/infocom.2014.6847970 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

Regular free-weight exercise helps to strengthen natural movements and stabilize muscles that are important strength, balance, posture of human beings. Prior works have exploited wearable sensors or RF signal changes for activity sensing, recognition, counting, etc.. However, none them incorporated three key factors necessary a practical monitoring system: recognizing activities on site, assessing their qualities, providing useful feedbacks the bodybuilder promptly. Our FEMO system provides...

10.1109/tmc.2017.2691705 article EN IEEE Transactions on Mobile Computing 2017-04-06

The limited bandwidth of Wi-Fi severely confines the granularity (especially in differentiating multiple subjects) sensing, posing a significant challenge for its wide adoption. Though utilizing channels to expand effective sounds plausible, continuous spectrum stitching towards ultra-wideband (UWB) is far from practical given various constraints (e.g., runtime channel availability and inconsistent responses across bandwidth). To this end, we propose UWB-Fi as novel sensing system with...

10.1145/3643832.3661889 article EN cc-by 2024-06-03

Different from online shopping, in-store shopping has few ways to collect the customer behaviors before purchase. In this paper, we present design and implementation of an on-site Customer Behavior Identification system based on passive RFID tags, named CBID. By collecting analyzing wireless signal features, CBID can detect track tag movements further infer corresponding behaviors. We model three main objectives behavior identification by concrete problems solve them using novel protocols...

10.1109/icnp.2014.26 article EN 2014-10-01

Sentiment analysis is an important task in social computing and behavior analysis, a typical indicator of health. It challenging mission to predict the sentiment people socially implemented Internet Medical Things (IoMT) systems. The existing methods have several defects, defect that most ignore fact there much noise IoMT systems it far not enough only develop classification models for one type data. In systems, many treat review text as plain but potential knowledge structure. To solve...

10.1109/tcss.2023.3252028 article EN IEEE Transactions on Computational Social Systems 2023-03-13

Smart packaging adds sensing abilities to traditional packages. This paper investigates the possibility of using RF signals test internal status packages and detect abnormal changes. Towards this goal, we design implement a nondestructive package testing verification system commodity passive RFID systems, called Echoscope. Echoscope extracts unique features from backscatter penetrating space compares them with previously collected during check-in phase. The use guarantees that there is no...

10.1109/tmc.2018.2852637 article EN IEEE Transactions on Mobile Computing 2018-07-03

A large number of Web APIs have been released as services in mobile communications, but the service provided by a single API is usually limited. To enrich developers combined and developed new service, which known mashup. The emergence mashups greatly increases especially networks Internet-of-Things (IoT), has encouraged companies individuals to develop even more mashups, led dramatic increase mashups. Such trend brings with it big data, such massive text data from themselves...

10.1016/j.dcan.2022.12.009 article EN cc-by-nc-nd Digital Communications and Networks 2022-12-12

As one of powerful and light weight Network Intrusion Detection System, Snort has good expansibility transplantability, can be used in various environments. However, clear deficiency on ARP spoofing detection, its own defense is powerless. To realize the detection prevention spoofing, paper expanded snort preprocessor plug-ins by adding an module. Results shows this way make sniffer itself immunity, locate attacker more timely accurately.

10.1109/iccasm.2010.5619113 article EN 2010-10-01

In this paper, we propose a system called R# to estimate the number of human objects using passive RFID tags but without attaching anything objects. The idea is based on our observation that more are present, higher variance in RSS values tag backscattered RF signal. Thus, received signal, reader can includes an and some (say 20) tags, which deployed region want monitor objects, such as front painting. periodically emits signal identify all simply respond with their IDs via C1G2 standard...

10.1109/infocom.2015.7218545 article EN 2015-04-01

With the rapid development of connected and autonomous vehicles (CAVs), a large number mobile edge applications (APPs) have been developed deployed through green communication networking technology. The problem high energy consumption during APPs usage becomes serious in this paper, we propose to optimize effective recommendation. Traditional recommendation methods for years, such as collaborative filtering latent factor models. But those are not designed only focus on use historical...

10.1109/tgcn.2022.3165262 article EN IEEE Transactions on Green Communications and Networking 2022-04-06

Gesture detection based on radio frequency signals has gained increasing popularity in recent years due to several benefits it brought, such as eliminating the need carry additional devices and providing better privacy. In traditional methods, significant breakthroughs have been made improve recognition accuracy scene robustness, but limited computing power of edge (the first-level equipment receive signals) requirement fast response for not adequately addressed. this article, we propose a...

10.1145/3532094 article EN ACM Transactions on Sensor Networks 2022-04-22

As a large scale real sensor network system, GreenOrbs reveals that locating nodes in the forest still faces great challenges because of volatile and fluctuating environmental factors. In this paper, we present novel localization scheme, EARL, which provides accurate reference good ranging quality. We exam range quality along routing paths by taking complex factors into account, such as density, temperature humidity. To improve accuracy, use power scanning technique to judge accuracy further...

10.1109/infcom.2012.6195458 article EN 2012-03-01

Numerous indoor localization techniques have been proposed recently to meet the intensive demand for location-based service. Fingerprint-based approach is one of most popular and inexpensive solution. In terms constructing fingerprint database, there be a synchronized measurement both space(eg by labor-intensive site-survey or sensor-based crowd sensing) space, this means fingerprints database established. It space hinders usability fingerprint-based system. work, we propose sensor-free...

10.1109/mass.2013.84 article EN 2013-10-01

As the Ultra High Frequency (UHF) passive Radio IDentification (RFID) technology becomes increasingly deployed, it faces an array of new security attacks. In this paper, we consider a type attack in which malicious RFID reader could arbitrarily modify tags via standard commands, e.g., IDs or other data memory. To deal with attack, propose physical-layer RF signal based authentication solution, namely Arbitrator, that involves passively listening on channels, analyzing communication signals,...

10.1109/infocom.2018.8486424 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

In this paper, we propose a system called R# to estimate the number of human objects using passive RFID tags but without attaching anything objects. The idea is based on our observation that more are present, higher variation in RSS values tag backscattered RF signals. Thus, received signals, reader can includes an and some (say 20) tags, which deployed region want monitor objects, such as front supermarket shelf. periodically emits signals identify all simply respond with their IDs via...

10.1109/tmc.2018.2852627 article EN IEEE Transactions on Mobile Computing 2018-07-03

Smart environments and security systems require automatic detection of human behaviors including approaching to or departing from an object. Existing motion usually beings carry special devices, which limits their applications. In this paper, we present a system called APID detect arm reaching by analyzing backscatter communication signals passive RFID tag on the does not any device. The idea is based influence movements vibration backscattered signals. compatible with commodity...

10.1145/2971648.2971699 article EN 2016-09-09
Coming Soon ...