- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Mobile Crowdsensing and Crowdsourcing
- Energy Efficient Wireless Sensor Networks
- Cooperative Communication and Network Coding
- Indoor and Outdoor Localization Technologies
- Auction Theory and Applications
- Privacy-Preserving Technologies in Data
- RFID technology advancements
- User Authentication and Security Systems
- Human Mobility and Location-Based Analysis
- Optimization and Search Problems
- Gaze Tracking and Assistive Technology
- Advanced Bandit Algorithms Research
- Advanced MIMO Systems Optimization
- Cognitive Radio Networks and Spectrum Sensing
- Interactive and Immersive Displays
- Security in Wireless Sensor Networks
- Advanced Wireless Network Optimization
- Biometric Identification and Security
- Wireless Communication Security Techniques
- Context-Aware Activity Recognition Systems
- Smart Grid Energy Management
- Gait Recognition and Analysis
- Digital Transformation in Industry
University of Science and Technology of China
2024
Tsinghua University
2010-2023
Xi'an High Tech University
2021
Illinois Institute of Technology
2009-2015
Hangzhou Dianzi University
2010-2011
Tongji University
2011
IIT Research Institute
2011
Mobile crowdsourced sensing (MCS) is a new paradigm which takes advantage of pervasive smartphones to efficiently collect data, enabling numerous novel applications. To achieve good service quality for MCS application, incentive mechanisms are necessary attract more user participation. Most existing apply only the offline scenario where all users' information known priori. On contrary, we focus on realistic users arrive one by online in random order. Based auction model, investigate problem...
Off-the-shelf smartphones have boosted large scale participatory sensing applications as they are equipped with various functional sensors, possess powerful computation and communication capabilities, proliferate at a breathtaking pace. Yet the low participation level of smartphone users due to resource consumptions, such time power, remains hurdle that prevents enjoyment brought by applications. Recently, some researchers done pioneer works in motivating contribute their resources designing...
Mobile crowd sensing (MCS) is a new paradigm that takes advantage of pervasive mobile devices to efficiently collect data, enabling numerous novel applications. To achieve good service quality for an MCS application, incentive mechanisms are necessary attract more user participation. Most existing apply only the offline scenario where all users report their strategic types in advance. On contrary, we focus on realistic arrive one by online random order. Based auction model, investigate...
Motivated by the needs of precise carbon emission measurement and real-time surveillance for CO <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> management in cities, we present CitySee, a -monitoring system using sensor networks an urban area (around 100 square kilometers). In order to conduct environment monitoring long-term manner, CitySee has address following challenges, including deployment, data collection, processing, network...
In spite of the remarkable efforts community put to build sensor systems, an essential question still remains unclear at system level, motivating us explore answer from a point real-world deployment view. Does wireless network really scale? We present findings large scale operating system, GreenOrbs, with up 330 nodes deployed in forest. instrument such throughout protocol stack and observations across layers network. Based on our measurement, we propose make initial validate three...
Human-carried or vehicle-mounted sensors can be exploited to collect data ubiquitously for building various sensing maps. Most of existing mobile applications consider users reporting and accessing through the Internet. However, this approach cannot applied in scenarios with poor network coverage expensive access. Existing forwarding schemes opportunistic networks are not sufficient as spatial-temporal correlation among sensory has been explored. In order build maps satisfying specific...
Device to device (D2D) communication is expected become a promising technology of the next-generation wireless systems. Security issues have technical barriers D2D due its "open-air" nature and lack centralized control. Generating symmetric keys individually on different parties without key exchange or distribution desirable but challenging. Recent work has proposed extract from measurement physical layer random variations channel, e.g., channel state information (CSI) orthogonal...
With the increased popularity of smartphones, various security threats and privacy leakages targeting them are discovered investigated. In this work, we present SilentSense, a framework to authenticate users silently transparently by exploiting dynamics mined from user touch behavior biometrics micro-movement device caused user's screen-touch actions. We build “touch-based biometrics” model owner extracting some principle features, then verify whether current is or guest/attacker. When using...
In this paper, we study periodic query scheduling for data aggregation with minimum delay under various wireless interference models. Given a set <i xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Q</i> of queries, each <sub xmlns:xlink="http://www.w3.org/1999/xlink">i</sub> ∈ has its own period <b xmlns:xlink="http://www.w3.org/1999/xlink">p</b> xmlns:xlink="http://www.w3.org/1999/xlink">i</i> and the subset source nodes...
Anti-jamming communication without pre-shared secrets has gained increasing research interest recently and is commonly tackled by utilizing the technique of uncoordinated frequency hopping (UFH). Existing researches, however, are almost all based on ad hoc designs strategies, mainly due to lack theoretical foundations for scheme performance evaluation. To fill this gap, in paper we introduce online optimization theory into our solution and, first time, make thorough quantitative...
In this work, we explore a new networking mechanism with smart glasses, through which users can express their interest and connect to target simply by gaze. Doing this, attempt let wearable devices understand human attention intention, pair carried according such intention. To achieve ambitious goal, propose proof-of-concept system iGaze, visual driven suite: an iGaze glass (hardware), protocol VAN (software). Our glass, is low-cost head-mounted camera, orientation sensors, microphone...
Accurate maps are increasingly important with the growth of smart phones and development location-based services. Several crowdsourcing based map generation protocols have been proposed that rely on volunteers to provide their traces. Being creative, however, those methods pose a significant threat user privacy as traces can easily imply behavior patterns. On flip side, crowdsourcing-based method does need individual locations. To address issue, we present systematic...
RFID has been widely adopted as an effective method for anti-counterfeiting. Legacy systems based on security protocol are either too heavy to be affordable by passive tags or suffering from various protocol-layer attacks, e.g. reverse engineering, cloning, side-channel. In this work, we present a novel anti-counterfeiting system, TagPrint, using COTS and readers. Achieving low-cost offline genuineness validation utilizing daunting task. Our system achieves these three goals leveraging few...
The ever increasing popularity of social networks and the easier photo taking sharing experience have led to unprecedented concerns on privacy infringement. Inspired by fact that Robot Exclusion Protocol, which regulates web crawlers' behavior according a per-site deployed robots.txt, cooperative practices major search service providers, contributed healthy industry, in this paper, we propose Privacy Expressing Respecting Protocol (PERP) consists Privacy.tag -- physical tag enables user...
Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication large-scale RFID systems, researchers propose tree-based approaches, which any pair of tags share a number key components. Such designs, being efficient, often fail forward secrecy and resistance attacks, such as compromising desynchronization. Indeed, these attacks may still take effect even after tag successfully finishes the...
It is imperative to design efficient and effective online spectrum allocation methods since requests for spectrums often come in an fashion. In this paper, we propose SALSA, strategyproof admission wireless networks. We assume that the arrival follows Poisson distribution. Upon receiving request, our protocol will decide immediately whether grant its exclusive usage or not, how much request should pay. Preempting existing not allowed. proposed two protocols have guaranteed performances...
To stay competitive, plenty of data mining techniques have been introduced to help stores better understand consumers' behaviors. However, these studies are generally confined within the customer transaction data. Actually, another kind `deep shopping data', e.g. which and why goods receiving much attention not purchased, offers more valuable information boost product design. Unfortunately, totally ignored in legacy systems. This paper introduces an innovative system, called TagBooth, detect...
Children are one of the groups most influenced by COVID-19-related social distancing, and a lack contact with peers can limit their opportunities to develop collaborative skills. However, remote socialization collaboration as an alternative approach is still great challenge for children. This paper presents MR.Brick, Mixed Reality (MR) educational game system that helps children adapt collaboration. A controlled experimental study involving 24 aged six ten was conducted compare MR.Brick...
In wireless networks, we need to allocate spectrum efficiently. One challenge is that the usage requests often come in an online fashion. The second secondary users a cognitive radio network are selfish and prefer maximize their own benefits. this paper, address these two challenges by proposing TOFU, semi-truthful frequency allocation method for networks when primary can sublease spectrums users. our protocol, required submit bid α time slots before its usage. Upon receiving request,...
Accurate maps are increasingly important with the growth of smart phones and development location-based services. Several crowdsourcing based map generation protocols that rely on users to provide their traces have been proposed. Being creative, however, those methods pose a significant threat user privacy as can easily imply behavior patterns. On flip side, crowdsourcing-based method does need individual locations. To address issue, we present systematic participatory-sensing-based...
Minimizing the peak power consumption of electrical appliances under delay requirements is shown to be NP-hard. To address this, we propose a "family plan" approach that partitions users into groups and schedules users' minimize each group. Our scheme leverages social network topology statistical energy usage patterns users. partition with potential reducing consumption, our distributed clustering seeks such total in group achieves minimum variance. Then, given set jobs scheduled next...
We study the general scaling laws of capacity for random wireless networks under generalized physical model. The generality this work is embodied in three dimensions denoted by (λ ∈ [1, n], n <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">d</sub> xmlns:xlink="http://www.w3.org/1999/xlink">s</sub> (1, n]). It means that: (1) network a node density λ rather than only either dense (RDN, = n) or extended (REN, 1) as literature. (2) focus on...
We study the asymptotic networking-theoretic multicast capacity bounds for random extended networks (REN) under Gaussian channel model, in which all wireless nodes are individually power-constrained. During transmission, power decays along path with attenuation exponent \alpha > 2. In REN, n randomly distributed square region of side length \sqrt{n}. There n_s and independently chosen sessions. Each session has n_d+1 terminals, including one source n_d destinations. By effectively combining...
We study distributed link scheduling for throughput maximization in wireless networks. The majority of results on assume binary interference models simplicity. While the physical model reflects reality more precisely, problem becomes notoriously harder under model. There have been just a few existing centralized model, though schedulings are practical. In this paper, by leveraging partition and shifting strategies pick-and-compare scheme, we present first algorithm that can achieve constant...