Dingyi Fang

Orcid: 0000-0002-5816-6922

According to our database1, Dingyi Fang authored at least 206 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TagSleep3D: RF-based 3D Sleep Posture Skeleton Recognition.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2024

2023
Toward Wide-Area Contactless Wireless Sensing.
IEEE/ACM Trans. Netw., April, 2023

RF-CM: Cross-Modal Framework for RF-enabled Few-Shot Human Activity Recognition.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2023

Akte-Liquid: Acoustic-based Liquid Identification with Smartphones.
ACM Trans. Sens. Networks, February, 2023

Hybrid HMM Decoder for Convolutional Codes by Joint Trellis-Like Structure and Channel Prior.
IEEE Trans. Cogn. Commun. Netw., February, 2023

BioScatter: Low-Power Sweat Sensing with Backscatter.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

Fusang: Graph-inspired Robust and Accurate Object Recognition on Commodity mmWave Devices.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

2022
Graph convolutional networks in language and vision: A survey.
Knowl. Based Syst., 2022

Detecting code vulnerabilities by learning from large-scale open source repositories.
J. Inf. Secur. Appl., 2022

AllSpark: Enabling Long-Range Backscatter for Vehicle-to-Infrastructure Communication.
IEEE Internet Things J., 2022

Earmonitor: In-ear Motion-resilient Acoustic Sensing Using Commodity Earphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

SDN-based bandwidth scheduling for prioritized data transfer between data centers.
Clust. Comput., 2022

SmartLens: sensing eye activities using zero-power contact lens.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Eliminating Design Effort: A Reconfigurable Sensing Framework For Chipless, Backscatter Tags.
Proceedings of the 21st ACM/IEEE International Conference on Information Processing in Sensor Networks, 2022

2021
Parallel Backscatter in the Wild: When Burstiness and Randomness Play With You.
IEEE/ACM Trans. Netw., 2021

Simultaneous Material Identification and Target Imaging with Commodity RFID Devices.
IEEE Trans. Mob. Comput., 2021

Exploiting Interference Fingerprints for Predictable Wireless Concurrency.
IEEE Trans. Mob. Comput., 2021

Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection.
IEEE Trans. Inf. Forensics Secur., 2021

Cantor: Improving Goodput in LoRa Concurrent Transmission.
IEEE Internet Things J., 2021

RF-Identity: Non-Intrusive Person Identification Based on Commodity RFID Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Towards practical 3D ultrasound sensing on commercial-off-the-shelf mobile devices.
Comput. Networks, 2021

Automated conformance testing for JavaScript engines via deep compiler fuzzing.
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021

Pushing the Physical Limits of IoT Devices with Programmable Metasurfaces.
Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 2021

Plant Keeper: Towards Wireless Sensing to Ion Transmission of Plants.
Proceedings of the LP-IoT@MobiCom 2021: Proceedings of the 1st ACM Workshop on No Power and Low Power Internet-of-Things, New Orleans, LA, USA, 31 January 2022, 2021

RISE: robust wireless sensing using probabilistic and statistical assessments.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

2020
Using Generative Adversarial Networks to Break and Protect Text Captchas.
ACM Trans. Priv. Secur., 2020

E2PP: An Energy-Efficient Path Planning Method for UAV-Assisted Data Collection.
Secur. Commun. Networks, 2020

Bandwidth scheduling for big data transfer with two variable node-disjoint paths.
J. Commun. Networks, 2020

Coverage-Oriented Task Assignment for Mobile Crowdsensing.
IEEE Internet Things J., 2020

SitR: Sitting Posture Recognition Using RF Signals.
IEEE Internet Things J., 2020

QoS provisioning for various types of deadline-constrained bulk data transfers between data centers.
Future Gener. Comput. Syst., 2020

Semantics-aware obfuscation scheme prediction for binary.
Comput. Secur., 2020

Compile-time code virtualization for android applications.
Comput. Secur., 2020

Exploring commodity RFID for contactless sub-millimeter vibration sensing.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

Robust Self-Weighted Multi-View Projection Clustering.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Deep Program Structure Modeling Through Multi-Relational Graph-based Learning.
Proceedings of the PACT '20: International Conference on Parallel Architectures and Compilation Techniques, 2020

2019
Low-Cost and Robust Geographic Opportunistic Routing in a Strip Topology Wireless Network.
ACM Trans. Sens. Networks, 2019

cDeepArch: A Compact Deep Neural Network Architecture for Mobile Sensing.
IEEE/ACM Trans. Netw., 2019

FlipTracer: Practical Parallel Decoding for Backscatter Communication.
IEEE/ACM Trans. Netw., 2019

DTransfer: extremely low cost localization irrelevant to targets and regions for activity recognition.
Pers. Ubiquitous Comput., 2019

Sensing Our World Using Wireless Signals.
IEEE Internet Comput., 2019

LungTrack: Towards Contactless and Zero Dead-Zone Respiration Monitoring with Commodity RFIDs.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Beyond Respiration: Contactless Sleep Sound-Activity Recognition Using RF Signals.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

A fast STAP method using persymmetry covariance matrix estimation for clutter suppression in airborne MIMO radar.
EURASIP J. Adv. Signal Process., 2019

Find me a safe zone: A countermeasure for channel state information based attacks.
Comput. Secur., 2019

Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity.
IEEE Access, 2019

Leveraging WebAssembly for Numerical JavaScript Code Virtualization.
IEEE Access, 2019

Exploiting Binary-Level Code Virtualization to Protect Android Applications Against App Repackaging.
IEEE Access, 2019

Tagtag: material sensing with commodity RFID.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

Towards wide-area contactless human sensing: poster abstract.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

WideSee: towards wide-area contactless wireless sensing.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

Co-Scheduling of Advance and Immediate Bandwidth Reservations for Inter-Data Center Transfer.
Proceedings of the 2019 IEEE/ACM Innovating the Network for Data-Intensive Science, 2019

WisDriver: A WiFi and Smartphone Sensing System for Safely Driving.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019

WiMi: Target Material Identification with Commodity Wi-Fi Devices.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

LoRaSense: An Interference-aware Concurrent Transmission Model.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

Demo: Image Recommendation with User Intent on a Mobile.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

RS3CIS: Robust Single-Step Spectral Clustering with Intrinsic Subspace.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Resource Allocation in Reverse TDD Wireless Backhaul HetNets With 3D Massive Antennas.
IEEE Wirel. Commun. Lett., 2018

Low Human-Effort, Device-Free Localization with Fine-Grained Subcarrier Information.
IEEE Trans. Mob. Comput., 2018

iGuard: A Real-Time Anti-Theft System for Smartphones.
IEEE Trans. Mob. Comput., 2018

A Video-based Attack for Android Pattern Lock.
ACM Trans. Priv. Secur., 2018

Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery.
Sensors, 2018

Face detection of golden monkeys via regional color quantization and incremental self-paced curriculum learning.
Multim. Tools Appl., 2018

Artistic features extraction from chinese calligraphy works via regional guided filter with reference image.
Multim. Tools Appl., 2018

2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster Rescue.
J. Inf. Sci. Eng., 2018

SleepGuard: Capturing Rich Sleep Information Using Smartwatch Sensing Data.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

An Improving EFA for Clutter Suppression by Using the Persymmetric Covariance Matrix Estimation.
Circuits Syst. Signal Process., 2018

Material Identification and Target Imaging with RFIDs [IoT Connection].
Computer, 2018

Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling.
Comput. Secur., 2018

Enabling robust and reliable transmission in Internet of Things with multiple gateways.
Comput. Networks, 2018

Maximizing throughput for low duty-cycled sensor networks.
Comput. Networks, 2018

EasyGo: Low-cost and robust geographic opportunistic sensing routing in a strip topology wireless sensor network.
Comput. Networks, 2018

Social Connection Aware Team Formation for Participatory Tasks.
IEEE Access, 2018

DeepAid: A Mobile Cognitive Aid System with Compacted Deep Learning.
Proceedings of the 2018 IEEE SmartWorld, 2018

PLoRa: a passive long-range data network from ambient LoRa transmissions.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018

Material Identification with Commodity Wi-Fi Devices.
Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, SenSys 2018, 2018

Bandwidth Scheduling for Big Data Transfer with Deadline Constraint between Data Centers.
Proceedings of the 5th IEEE/ACM International Workshop on Innovating the Network for Data-Intensive Science, 2018

Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications, 2018

CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Line separation from topographic maps using regional color and spatial information.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Robust Auto-Weighted Multi-View Clustering.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Exploiting Code Diversity to Enhance Code Virtualization Protection.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Time Context-Aware IPTV Program Recommendation Based on Tensor Learning.
Proceedings of the IEEE Global Communications Conference, 2018

Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Efficient Network Coding with Interference-Awareness and Neighbor States Updating in Wireless Networks.
Wirel. Commun. Mob. Comput., 2017

D-Watch: Embracing "Bad" Multipaths for Device-Free Localization With COTS RFID Devices.
IEEE/ACM Trans. Netw., 2017

FitLoc: Fine-Grained and Low-Cost Device-Free Localization for Multiple Targets Over Various Areas.
IEEE/ACM Trans. Netw., 2017

E-HIPA: An Energy-Efficient Framework for High-Precision Multi-Target-Adaptive Device-Free Localization.
IEEE Trans. Mob. Comput., 2017

A Study of Pattern Prediction in the Monitoring Data of Earthen Ruins with the Internet of Things.
Sensors, 2017

Treasures status monitoring based on dynamic link-sensing.
Peer-to-Peer Netw. Appl., 2017

Content caching with virtual spatial locality in Cellular Network.
Pervasive Mob. Comput., 2017

GuideLoc: UAV-Assisted Multitarget Localization System for Disaster Rescue.
Mob. Inf. Syst., 2017

Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes.
Mob. Inf. Syst., 2017

Bandwidth scheduling for big data transfer using multiple fixed node-disjoint paths.
J. Netw. Comput. Appl., 2017

RF-Copybook: A Millimeter Level Calligraphy Copybook based on commodity RFID.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Thwarting Android app repackaging by executable code fragmentation.
Int. J. High Perform. Comput. Netw., 2017

Joint 3D Beamforming and Resource Allocation for Small Cell Wireless Backhaul in HetNets.
IEEE Commun. Lett., 2017

Human Behavior Recognition Using Wi-Fi CSI: Challenges and Opportunities.
IEEE Commun. Mag., 2017

Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017

Performance Analysis on 3D Beamforming for Downlink In-Band Wireless Backhaul for Small Cells.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Exploit dynamic data flows to protect software against semantic attacks.
Proceedings of the 2017 IEEE SmartWorld, 2017

SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Cracking Android Pattern Lock in Five Attempts.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster Rescue.
Proceedings of the International Conference on Networking and Network Applications, 2017

TagScan: Simultaneous Target Imaging and Material Identification with Commodity RFID Devices.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Target Material Identification with Commodity RFID Devices.
Proceedings of the 9th ACM Workshop on Wireless of the Students, 2017

Demo: Material Identification with Commodity RFID Devices.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017

SpeAR: A Fast AR System with High Accuracy Deployed on Mobile Devices.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

AppIS: Protect Android Apps Against Runtime Repackaging Attacks.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

iUpdater: Low Cost RSS Fingerprints Updating for Device-Free Localization.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Poster: Just-Microsecond Deblurring System on the Mobile Phone.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

DexPro: A Bytecode Level Code Protection System for Android Applications.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Protect Sensitive Information against Channel State Information Based Attacks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Mobile-Deblur: A Clear Image Will on the Smart Device.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
EETC: to transmit or not to transmit in mobile wireless sensor networks.
Wirel. Networks, 2016

FISCP: fine-grained device-free positioning system for multiple targets working in sparse deployments.
Wirel. Networks, 2016

DE 2: localization based on the rotating RSS using a single beacon.
Wirel. Networks, 2016

RSS Distribution-Based Passive Localization and Its Application in Sensor Networks.
IEEE Trans. Wirel. Commun., 2016

A multi-direction virtual array transformation algorithm for 2D DOA estimation.
Signal Process., 2016

Node Immunization with Time-Sensitive Restrictions.
Sensors, 2016

Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality.
Mob. Inf. Syst., 2016

Artistic information extraction from Chinese calligraphy works via Shear-Guided filter.
J. Vis. Commun. Image Represent., 2016

SmartMTra: Put the Limit of the Inertial Sensor Based Indoor Motion Trajectory Tracing Using Smartphone.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Exploiting Dynamic Scheduling for VM-Based Code Obfuscation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

TafLoc: Time-adaptive and Fine-grained Device-free Localization with Little Cost.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Bandwidth Scheduling with Multiple Fixed Node-Disjoint Paths in High-Performance Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

DEDV: A Data Collection Method for Mobile Sink Based on Dynamic Estimation of Data Value in WSN.
Proceedings of the International Conference on Networking and Network Applications, 2016

Poster: A Real-Time and Low-Cost Escalator Riding Monitoring System for Preventing The Accidental Dangers.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Poster: A Device-free Evaluation System for Gymnastics using Passive RFID Tags.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Poster: HALL: High-accuracy and Low-cost RFID Localization in Large-scale environment.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

A novel CSI pre-processing scheme for device-free localization indoors.
Proceedings of the Eighth Wireless of the Students, 2016

LiFS: low human-effort, device-free localization with fine-grained subcarrier information.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Low-cost wireless phase calibration that works on COTS RFID systems: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Bandwidth scheduling with multiple variable node-disjoint paths in high-performance networks.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

DualSync: Taming clock skew variation for synchronization in low-power wireless networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Watch Traffic in the Sky: A Method for Path Selection in Packet Transmission between V2V from Macro Perspective.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Smoggy-Link: Fingerprinting interference for predictable wireless concurrency.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

NCFR: Network Coding Fair Routing for Multi-success-rate Wireless Sensor Networks.
Proceedings of the Human Centered Computing - Second International Conference, 2016

A QoS Opportunistic Routing Based on Directional Transmission for Wireless Sensor Networks.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

The Research and Discussion on Effectiveness Evaluation of Software Protection.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

A Data Cleaning Method and Its Application for Earthen Site Data Monitored by WSN.
Proceedings of the Pattern Recognition - 7th Chinese Conference, 2016

2015
Transferring Compressive-Sensing-Based Device-Free Localization Across Target Diversity.
IEEE Trans. Ind. Electron., 2015

NDSL: Node Density-Based Subregional Localization in Large Scale Anisotropy Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

CTLL: A Cell-Based Transfer Learning Method for Localization in Large Scale Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Location-Related Challenges and Strategies in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

A Grid-Based Linear Least Squares Self-Localization Algorithm in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2015

Multi-link Passive Localization with Low Cost in Wireless Sensor Networks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

A Wakeup Adapting Traffic and Receiver-Initiated Duty Cycle Protocol for WSN.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Doppler Effect based Moving Target Detection Adaptive to Speed.
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015

An Efficient Variable Dimension PSO Algorithm for Mobile Node Tour Planning in WSN.
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015

Low-cost Device-Free Localization using Detection Probability Model in Outdoors.
Proceedings of the 3rd International Workshop on Energy Harvesting & Energy Neutral Sensing Systems, 2015

FSNC: Flexible and Scalable Network Coding in Wireless Networks.
Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication, 2015

LIPS: Bring LIght Propagation Selection to Geographic Opportunistic Routing in Strip WSNs.
Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication, 2015

Accurate Device-Free Localization with Little Human Cost.
Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, 2015

Poster: A Low Cost People Flow Monitoring System For Sensing The Potential Danger.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Poster: On the Low-Cost and Distance-Adaptive Device-free Localization.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Poster: An Insomnia Therapy for Clock Synchronization in Wireless Sensor Networks.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

TaLc: Time Adaptive Indoor Localization with Little Cost.
Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, 2015

The New Attribute-Based Generalized Signcryption Scheme.
Proceedings of the Intelligent Computation in Big Data Era, 2015

A survival condition model of earthen sites based on the danger theory.
Proceedings of the 11th International Conference on Natural Computation, 2015

LSVS: Bringing Layer Slicing and Virtual Sinks to Geographic Opportunistic Routing in Strip WSNs.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

2014
Link Sensing-Adaptive Passive Object Localization in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Voltage-Aware Time Synchronization for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

RPC: A Localization Method Based on Regional Partition and Cooperation.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Who Move the Treasures: A RFID-based Approach for the Treasures.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Aerial wireless localization using target-guided flight route.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

TDVMP: Improved Virtual Machine-Based Software Protection with Time Diversity.
Proceedings of the 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2014, 2014

Poster: environment-adaptive clock calibration for wireless sensor networks.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Poster: doppler effect based device-free moving object localization.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Poster abstract: Implications of target diversity for organic device-free localization.
Proceedings of the IPSN'14, 2014

Poster abstract: NDP: a novel device-free localization method with little efforts.
Proceedings of the IPSN'14, 2014

Poster abstract: EIL: an environment-independent device-free passive localization approach.
Proceedings of the IPSN'14, 2014

SCHAP: The Aggregate SignCryption Based Hybrid Authentication Protocol for VANET.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

A Novel Method for Protritage Site with WSN.
Proceedings of the Human Centered Computing - First International Conference, 2014

Heterogeneous Data Fusion Model for Passive Object Localization.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

A Self-Localization Scheme with Grid-Based Anchor Selection in Wireless Sensor Networks.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

2-D Adaptive Beamforming with Multiple Bi-Direction Optimization Based on Data Matrix and Application in Interferences Localization.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

2013
DE2: Localization with the Rotating RSS Using a Single Beacon.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

LCS: Compressive sensing based device-free localization for multiple targets in sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Method to Evaluate Software Protection Based on Attack Modeling.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Software Attack Modeling and Its Application.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Bandwidth Reservation for Target Tracking in Region-Base Wireless Sensor Networks.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Prioritizing the Data in the Target-Tracking Wireless Sensor Networks.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

DLF: Target Detection and Localization in Wireless Network.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

An Immune Theory Based Health Monitoring and Risk Evaluation of Earthen Sites with Internet of Things.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

EBRP: An Energy Balance Routing Protocol for Wireless Sensor Network with Intermittent Connectivity.
Proceedings of the Advances in Wireless Sensor Networks, 2013

NISLVMP: Improved Virtual Machine-Based Software Protection.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
An Energy-Balanced Cluster Range Control Algorithm with Energy Compensation Factors.
Proceedings of the Advances in Swarm Intelligence - Third International Conference, 2012

RDL: A novel approach for passive object localization in WSN based on RSSI.
Proceedings of IEEE International Conference on Communications, 2012

Improvement on Localization Error and Adaptability in DV-Hop Algorithm.
Proceedings of the Advances in Wireless Sensor Networks, 2012

A Novel Method for Passive Objective Adaption Localization Using Sensing Link.
Proceedings of the Advances in Wireless Sensor Networks, 2012

A Reliable Congestion Avoidance Protocol for Wireless Sensor Networks.
Proceedings of the Advances in Wireless Sensor Networks, 2012

2011
Rhinopithecus roxellana monitoring and identification using wireless sensor networks.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

Earthen site protection using wireless sensor networks.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

A Reliable Transmission Protocol Based on Dynamic Link Cache.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

A tamper-proof software watermark using code encryption.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

The Reliable Transmission Research of the Random Data in WSN Earthen Sites Health Monitoring.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
Intelligent Content Filtering Model for Network Security Audit System.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

An Anti-attack Watermarking Based on Synonym Substitution for Chinese Text.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Research on Integration of Safety Analysis in Model-Driven Software Development.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Dynamic Graph Watermark Scheme of Tamper Resistance.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Text Digital Watermarking for Chinese Word Document.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008


  Loading...