- Underwater Vehicles and Communication Systems
- Indoor and Outdoor Localization Technologies
- Speech and Audio Processing
- RFID technology advancements
- Advanced Malware Detection Techniques
- Bluetooth and Wireless Communication Technologies
- Cryptographic Implementations and Security
- Smart Parking Systems Research
- IoT Networks and Protocols
- Maritime Navigation and Safety
- QR Code Applications and Technologies
- IoT and Edge/Fog Computing
- Satellite Communication Systems
- User Authentication and Security Systems
Dalian Maritime University
2020
Tsinghua University
2012-2014
Hong Kong University of Science and Technology
2012
University of Hong Kong
2012
Indoor localization is of great importance for a range pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require process site survey, which radio signatures are collected and stored further comparison matching. Site survey involves intensive costs on manpower time. In this work, we study unexploited RF signal characteristics leverage user motions to construct floor plan that previously obtained by survey. On basis, design WILL, an...
Indoor localization is of great importance for a range pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require process site survey, which radio signatures are collected and stored further comparison matching. Site survey involves intensive costs on manpower time. In this work, we study unexploited RF signal characteristics leverage user motions to construct floor plan that previously obtained by survey. On basis, design WILL, an...
Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has done address the scalability issue in batch authentications. Deterministic approaches verify them one by one, and communication overhead time cost grow linearly with increasing size of tags. We design a fine-grained authentication scheme, INformative Counting (INC), which achieves sublinear verifications. INC also provides results accurate estimates number...
In many logistics applications of RFID technology, luggage attached with tags are placed on moving conveyor belts for processing. It is important to figure out the order goods so that further actions like sorting can be accurately taken proper goods. Due arbitrary placement or irregularity wireless signal propagation, neither tag identification nor received strength provides sufficient evidence their relative positions belts. this study, we observe, from experiments, a critical region...
Near field authentication is of great importance for a range applications, and has attracted many research efforts in the past decades. Several approaches have been developed demonstrated their feasibility. The state-of-art works, however, still much room to improve automation usability. First, user assistance required most existing approaches, which will be easily observed imitated by attackers. Second, authentications several works heavily depend on special hardware, e.g., Server or high...
VHF Data Exchange System (VDES) is considered as an important component of the future maritime communication system by International Maritime Organization (IMO). On basis existing Automatic Identification (AIS), VDES adds other two higher capacity subsystems: Application Specific Message (ASM) and (VDE). The Random Access Channel (RACH) VDE was first introduced in Telecommunication Union (ITU) Recommendation M.2092-0. As slot planning principle RACH interval, which significantly different...