- Indoor and Outdoor Localization Technologies
- RFID technology advancements
- Underwater Vehicles and Communication Systems
- Wireless Networks and Protocols
- Speech and Audio Processing
- Terahertz technology and applications
- Mobile Crowdsensing and Crowdsourcing
- Energy Efficient Wireless Sensor Networks
- Internet Traffic Analysis and Secure E-voting
- Caching and Content Delivery
- Photonic and Optical Devices
- Millimeter-Wave Propagation and Modeling
- Business Process Modeling and Analysis
- Ultra-Wideband Communications Technology
- Spectroscopy and Laser Applications
- Petri Nets in System Modeling
- User Authentication and Security Systems
- Context-Aware Activity Recognition Systems
- Advanced Photonic Communication Systems
- Bluetooth and Wireless Communication Technologies
- Service-Oriented Architecture and Web Services
- Network Security and Intrusion Detection
- Web Data Mining and Analysis
- Financial Markets and Investment Strategies
- Recommender Systems and Techniques
Xidian University
2018-2024
Huawei Technologies (Canada)
2021-2024
Central South University
2022
Soochow University
2022
First Affiliated Hospital of Soochow University
2022
National Clinical Research Center for Digestive Diseases
2022
Xiangya Hospital Central South University
2022
Sichuan Normal University
2019
Institute of Software
2018
Xi'an Jiaotong University
2012-2017
Crowd counting, which count or accurately estimate the number of human beings within a region, is critical in many applications, such as guided tour, crowd control and marketing research analysis. A counting solution should be scalable minimally intrusive (i.e., device-free) to users. Image-based solutions are device-free, but cannot work well dim dark environment. Non-image based usually require every being carrying device, inaccurate unreliable practice. In this paper, we present FCC,...
Device-free object tracking provides a promising solution for many localization and systems to monitor non-cooperative objects, such as intruders, which do not carry any transceiver. However, existing device-free solutions mainly use special sensors or active RFID tags, are much more expensive compared passive tags. In this paper, we propose novel motion detection method using named Twins. The leverages newly observed phenomenon called critical state caused by interference among We...
Physical-layer identification utilizes unique features of wireless devices as their fingerprints, providing authenticity and security guarantee. Prior physical-layer techniques on radio frequency (RFID) tags require nongeneric equipments are not fully compatible with existing standards. In this paper, we propose a novel system, GenePrint, for UHF passive tags. The GenePrint prototype system is implemented by commercial reader, USRP-based monitor, off-the-shelf Our solution generic completely...
The research on Wi-Fi sensing has been thriving over the past decade but process not smooth. Three barriers always hamper research: 1) unknown baseband design and its influence; 2) inadequate hardware; 3) lack of versatile flexible measurement software. This article tries to eliminate these through following work. <i>First</i>, we present an in-depth study Qualcomm Atheros AR9300 (QCA9300) NIC. We identify a missing item existing channel state information (CSI) model, namely, CSI distortion,...
The rapid increase of the data user behaviors on Internet brings a promising chance to better discover preferences. Recommender systems have become popular tool for discovery One key issue is how employ behavior sequences develop effective sequential recommendations, especially when are biased. current recommendation methods either can only mine dependencies but ignores bias or learn cannot dependencies. To solve these problems, in this article, we propose neural collaborative learning...
We present a theoretical model and preliminary experimental results on the dielectric constant measurement of thin films by using differential time-domain spectroscopy. This technique greatly reduces minimum measurable thickness, it promises μm-thick with frequency range from GHz to THz.
Comparing to well protected data frames, Wi-Fi management frames (MFs) are extremely vulnerable various attacks. Since MFs transmitted without encryption or authentication, attackers can easily launch attacks by forging the MFs. In a collaborative environment with many sniffers, such be detected sensing anomaly RSS changes. However, it is quite difficult identify these spoofing assistance from other nodes. By exploiting some unique characteristics (e.g., rapid spatial decorrelation,...
Different from online shopping, in-store shopping has few ways to collect the customer behaviors before purchase. In this paper, we present design and implementation of an on-site Customer Behavior IDentification system based on passive RFID tags, named CBID. By collecting analyzing wireless signal features, CBID can detect track tag movements further infer corresponding behaviors. We model three main objectives behavior identification by concrete problems solve them using novel protocols...
Device-free based object tracking provides a promising solution for many localization and systems to monitor non-cooperative objects which do not carry any transceiver such as intruders. However, existing device-free solutions mainly use sensors active RFID tags, are much more expensive compared passive tags. In this paper, we propose novel motion detection method using named Twins. The leverages phenomenon called critical state caused by interference among We theoretically explain via an...
Regular free-weight exercise helps to strengthen natural movements and stabilize muscles that are important strength, balance, posture of human beings. Prior works have exploited wearable sensors or RF signal changes for activity sensing, recognition, counting, etc.. However, none them incorporated three key factors necessary a practical monitoring system: recognizing activities on site, assessing their qualities, providing useful feedbacks the bodybuilder promptly. Our FEMO system provides...
The limited bandwidth of Wi-Fi severely confines the granularity (especially in differentiating multiple subjects) sensing, posing a significant challenge for its wide adoption. Though utilizing channels to expand effective sounds plausible, continuous spectrum stitching towards ultra-wideband (UWB) is far from practical given various constraints (e.g., runtime channel availability and inconsistent responses across bandwidth). To this end, we propose UWB-Fi as novel sensing system with...
Different from online shopping, in-store shopping has few ways to collect the customer behaviors before purchase. In this paper, we present design and implementation of an on-site Customer Behavior Identification system based on passive RFID tags, named CBID. By collecting analyzing wireless signal features, CBID can detect track tag movements further infer corresponding behaviors. We model three main objectives behavior identification by concrete problems solve them using novel protocols...
Sentiment analysis is an important task in social computing and behavior analysis, a typical indicator of health. It challenging mission to predict the sentiment people socially implemented Internet Medical Things (IoMT) systems. The existing methods have several defects, defect that most ignore fact there much noise IoMT systems it far not enough only develop classification models for one type data. In systems, many treat review text as plain but potential knowledge structure. To solve...
Smart packaging adds sensing abilities to traditional packages. This paper investigates the possibility of using RF signals test internal status packages and detect abnormal changes. Towards this goal, we design implement a nondestructive package testing verification system commodity passive RFID systems, called Echoscope. Echoscope extracts unique features from backscatter penetrating space compares them with previously collected during check-in phase. The use guarantees that there is no...
A large number of Web APIs have been released as services in mobile communications, but the service provided by a single API is usually limited. To enrich developers combined and developed new service, which known mashup. The emergence mashups greatly increases especially networks Internet-of-Things (IoT), has encouraged companies individuals to develop even more mashups, led dramatic increase mashups. Such trend brings with it big data, such massive text data from themselves...
As one of powerful and light weight Network Intrusion Detection System, Snort has good expansibility transplantability, can be used in various environments. However, clear deficiency on ARP spoofing detection, its own defense is powerless. To realize the detection prevention spoofing, paper expanded snort preprocessor plug-ins by adding an module. Results shows this way make sniffer itself immunity, locate attacker more timely accurately.
In this paper, we propose a system called R# to estimate the number of human objects using passive RFID tags but without attaching anything objects. The idea is based on our observation that more are present, higher variance in RSS values tag backscattered RF signal. Thus, received signal, reader can includes an and some (say 20) tags, which deployed region want monitor objects, such as front painting. periodically emits signal identify all simply respond with their IDs via C1G2 standard...
With the rapid development of connected and autonomous vehicles (CAVs), a large number mobile edge applications (APPs) have been developed deployed through green communication networking technology. The problem high energy consumption during APPs usage becomes serious in this paper, we propose to optimize effective recommendation. Traditional recommendation methods for years, such as collaborative filtering latent factor models. But those are not designed only focus on use historical...
Gesture detection based on radio frequency signals has gained increasing popularity in recent years due to several benefits it brought, such as eliminating the need carry additional devices and providing better privacy. In traditional methods, significant breakthroughs have been made improve recognition accuracy scene robustness, but limited computing power of edge (the first-level equipment receive signals) requirement fast response for not adequately addressed. this article, we propose a...
As a large scale real sensor network system, GreenOrbs reveals that locating nodes in the forest still faces great challenges because of volatile and fluctuating environmental factors. In this paper, we present novel localization scheme, EARL, which provides accurate reference good ranging quality. We exam range quality along routing paths by taking complex factors into account, such as density, temperature humidity. To improve accuracy, use power scanning technique to judge accuracy further...
Numerous indoor localization techniques have been proposed recently to meet the intensive demand for location-based service. Fingerprint-based approach is one of most popular and inexpensive solution. In terms constructing fingerprint database, there be a synchronized measurement both space(eg by labor-intensive site-survey or sensor-based crowd sensing) space, this means fingerprints database established. It space hinders usability fingerprint-based system. work, we propose sensor-free...
As the Ultra High Frequency (UHF) passive Radio IDentification (RFID) technology becomes increasingly deployed, it faces an array of new security attacks. In this paper, we consider a type attack in which malicious RFID reader could arbitrarily modify tags via standard commands, e.g., IDs or other data memory. To deal with attack, propose physical-layer RF signal based authentication solution, namely Arbitrator, that involves passively listening on channels, analyzing communication signals,...
In this paper, we propose a system called R# to estimate the number of human objects using passive RFID tags but without attaching anything objects. The idea is based on our observation that more are present, higher variation in RSS values tag backscattered RF signals. Thus, received signals, reader can includes an and some (say 20) tags, which deployed region want monitor objects, such as front supermarket shelf. periodically emits signals identify all simply respond with their IDs via...
Smart environments and security systems require automatic detection of human behaviors including approaching to or departing from an object. Existing motion usually beings carry special devices, which limits their applications. In this paper, we present a system called APID detect arm reaching by analyzing backscatter communication signals passive RFID tag on the does not any device. The idea is based influence movements vibration backscattered signals. compatible with commodity...