- Indoor and Outdoor Localization Technologies
- RFID technology advancements
- Caching and Content Delivery
- Wireless Networks and Protocols
- Network Security and Intrusion Detection
- Energy Harvesting in Wireless Networks
- Network Traffic and Congestion Control
- Energy Efficient Wireless Sensor Networks
- Software-Defined Networks and 5G
- Speech and Audio Processing
- Cloud Computing and Resource Management
- Advanced Malware Detection Techniques
- User Authentication and Security Systems
- Internet Traffic Analysis and Secure E-voting
- Bluetooth and Wireless Communication Technologies
- Hand Gesture Recognition Systems
- Context-Aware Activity Recognition Systems
- Network Packet Processing and Optimization
- IoT and Edge/Fog Computing
- Peer-to-Peer Network Technologies
- Opportunistic and Delay-Tolerant Networks
- IoT-based Smart Home Systems
- Software Engineering Research
- Software Reliability and Analysis Research
- Security in Wireless Sensor Networks
North Carolina State University
2015-2024
Information Technology University
2022
University of Lahore
2022
University of the Punjab
2020
University of Engineering and Technology Lahore
2020
Islamia University of Bahawalpur
2020
Michigan State University
2012-2016
Capital University of Science and Technology
2016
National University of Computer and Emerging Sciences
2008-2011
Some pioneer WiFi signal based human activity recognition systems have been proposed. Their key limitation lies in the lack of a model that can quantitatively correlate CSI dynamics and activities. In this paper, we propose CARM, Activity Recognition Monitoring system. CARM has two theoretical underpinnings: CSI-speed model, which quantifies correlation between value movement speeds, CSI-activity speeds different body parts specific activity. By these models, build uses as profiling...
Keystroke privacy is critical for ensuring the security of computer systems and human users as what being typed could be passwords or sensitive information. In this paper, we show first time that WiFi signals can also exploited to recognize keystrokes. The intuition while typing a certain key, hands fingers user move in unique formation direction thus generate pattern time-series Channel State Information (CSI) values, which call CSI-waveform key. propose signal based keystroke recognition...
In this paper, we propose WifiU, which uses commercial WiFi devices to capture fine-grained gait patterns recognize humans. The intuition is that due the differences in gaits of different people, signal reflected by a walking human generates unique variations Channel State Information (CSI) on receiver. To profile movement using CSI, use processing techniques generate spectrograms from CSI measurements so resulting are similar those generated specifically designed Doppler radars. extract...
Since human bodies are good reflectors of wireless signals, activities can be recognized by monitoring changes in WiFi signals. However, existing WiFi-based activity recognition systems do not build models that quantify the correlation between signal dynamics and activities. In this paper, we propose a Channel State Information (CSI)-based Activity Recognition Monitoring system (CARM). CARM is based on two theoretical models. First, CSI-speed model quantifies relation CSI movement speeds....
With the rich functionalities and enhanced computing capabilities available on mobile devices with touch screens, users not only store sensitive information (such as credit card numbers) but also use privacy applications online banking) these devices, which make them hot targets for hackers thieves. To protect private information, such typically lock themselves after a few minutes of inactivity prompt password/PIN/pattern screen when reactivated. Passwords/PINs/patterns based schemes are...
WiFi based gesture recognition systems have recently proliferated due to the ubiquitous availability of in almost every modern building. The key limitation existing is that they require user be same configuration (i.e., at position and orientation) when performing gestures runtime as providing training samples, which significantly restricts their practical usability. In this paper, we propose a system, namely WiAG, recognizes irrespective his/her configuration. idea behind WiAG it first...
WiFi based gesture recognition has received significant attention over the past few years. However, key limitation of prior systems is that they cannot recognize gestures multiple users performing them simultaneously. In this paper, we address and propose WiMU, a Multi-User system. The idea behind WiMU when it detects some have performed simultaneously, first automatically determines number simultaneously (Na) then, using training samples collected from single user, generates virtual for...
Radio Frequency Identification (RFID) systems have been widely deployed for various applications such as object tracking, 3D positioning, supply chain management, inventory control, and access control. This paper concerns the fundamental problem of estimating RFID tag population size, which is needed in many identification, warehouse monitoring, privacy sensitive systems. In this paper, we propose a new scheme size called Average Run based Tag estimation (ART). The technique on average...
Software systems inherently contain vulnerabilities that have been exploited in the past resulting significant revenue losses. The study of vulnerability life cycles can help development, deployment, and maintenance software systems. It also designing future security policies conducting audits incidents. Furthermore, such an analysis customers to assess risks associated with products different vendors. In this paper, we conduct exploratory measurement a large data set containing 46310...
Software systems inherently contain vulnerabilities that have been exploited in the past resulting significant revenue losses. The study of vulnerability life cycles can help development, deployment, and maintenance software systems. It also designing future security policies conducting audits incidents. Furthermore, such an analysis customers to assess risks associated with products different vendors. In this paper, we conduct exploratory measurement a large data set containing 46310...
Keystroke privacy is critical for ensuring the security of computer systems and human users as what being typed could be passwords or sensitive information. In this paper, we show first time that WiFi signals can also exploited to recognize keystrokes. The intuition while typing a certain key, hands fingers user move in unique formation direction thus generate pattern time-series channel state information (CSI) values, which call CSI-waveform key. propose signal-based keystroke recognition...
With the dawn of Internet Things, small but smart devices have become ubiquitous. Although these carry a lot compute power and enable several interesting applications, they lack conventional interfaces such as keyboards, mice, touchscreens. As result, can't authenticate authorize users in familiar ways. Furthermore, unlike for settings, one-time authentication at start session usually isn't appropriate IoT, because application scenarios are dynamic user might not retain physical control or...
Over the last few years, researchers have proposed several WiFi based gesture recognition systems that can recognize predefined gestures performed by users at runtime. As most environments are inhabited multiple users, true potential of be unleashed only when each user independently define actions system should take performs a certain gesture. To enable this, not able to any given gesture, but also identify it. Unfortunately, none prior performing In this paper, we propose WiID, and...
Set queries are fundamental operations in computer systems and applications. This paper addresses the problem of designing a probabilistic data structure that can quickly process set using small amount memory. We propose Shifting Bloom Filter (ShBF) framework for representing querying sets. demonstrate effectiveness ShBF three types popular queries: membership, association, multiplicity queries. The key novelty is on encoding auxiliary information element location offset. In contrast, prior...
Frequent item mining, which deals with finding items that occur frequently in a given data stream over period of time, is one the heavily studied problems mining. A generalized version frequent mining persistent where item, unlike does not necessarily more compared to other short rather persists and occurs long time. To best our knowledge, there no prior work on stream. In this paper, we address fundamental problem during time at any observation point. We propose novel scheme, PIE, can...
Radio frequency identification (RFID) systems have been widely deployed for various applications such as object tracking, 3-D positioning, supply chain management, inventory control, and access control. This paper concerns the fundamental problem of estimating RFID tag population size, which is needed in many identification, warehouse monitoring, privacy-sensitive systems. In this paper, we propose a new scheme size called Average Run-based Tag estimation (ART). The technique based on...
Radio frequency identification (RFID) systems are widely used in various applications such as supply chain management, inventory control, and object tracking. Identifying RFID tags a given tag population is the most fundamental operation systems. While Tree Walking (TW) protocol has become industrial standard for identifying tags, little known about mathematical nature of this protocol, only some ad hoc heuristics exist optimizing it. In paper, first we analytically model TW then using that...
Radio Frequency Identification (RFID) systems are widely used in various applications such as supply chain management, inventory control, and object tracking. Identifying RFID tags a given tag population is the most fundamental operation systems. While Tree Walking (TW) protocol has become industrial standard for identifying tags, little known about mathematical nature of this only some ad-hoc heuristics exist optimizing it. In paper, first, we analytically model TW protocol, then using that...
There is a growing interest in the scientific community to develop techniques for humans communicate with computing that embedding into our environments. Researchers are already exploring ubiquitous modalities, such as radio frequency signals, gesture recognition systems. In this paper, we explore another modality, namely ambient light, and LiGest, an light based system. The key property of LiGest it agnostic lighting conditions, position orientation user, who performs gestures. general idea...
This paper concerns the practically important problem of multi-category radio frequency identification (RFID) estimation: given a set RFID tags, we want to quickly and accurately estimate number tags in each category. However, almost all existing estimation protocols are dedicated on single set, regardless tag categories. A feasible solution is separately execute The execution time such serial proportional categories, cannot satisfy delay-stringent application scenarios. Simultaneous RIFD...
With the rich functionalities and enhanced computing capabilities available on mobile devices with touch screens, users not only store sensitive information (such as credit card numbers) but also use privacy applications online banking) these devices, which make them hot targets for hackers thieves. To protect private information, such typically lock themselves after a few minutes of inactivity prompt password/PIN/pattern screen when reactivated. Passwords/ PINs/patterns based schemes are...