Jie Yang

According to our database1, Jie Yang authored at least 83 papers between 2008 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Implications of smartphone user privacy leakage from the advertiser's perspective.
Pervasive and Mobile Computing, 2019

MultiTrack: Multi-User Tracking and Activity Recognition Using Commodity WiFi.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Authenticating Users Through Fine-Grained Channel Information.
IEEE Trans. Mob. Comput., 2018

Monitoring Vital Signs and Postures During Sleep Using WiFi Signals.
IEEE Internet of Things Journal, 2018

ObstacleWatch: Acoustic-based Obstacle Collision Detection for Pedestrian Using Smartphone.
IMWUT, 2018

Sensing Fruit Ripeness Using Wireless Signals.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
Locating Rogue Access Point Using Fine-Grained Channel Information.
IEEE Trans. Mob. Comput., 2017

Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching.
IEEE Trans. Dependable Sec. Comput., 2017

Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors.
IEEE Trans. Mob. Comput., 2016

WiFinger: leveraging commodity WiFi for fine-grained finger gesture recognition.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Towards safer texting while driving through stop time prediction.
Proceedings of the First ACM International Workshop on Smart, 2016

Fine-grained gesture recognition using WiFi.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Leveraging wearables for steering and driver tracking.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Protecting Multi-Lateral Localization Privacy in Pervasive Environments.
IEEE/ACM Trans. Netw., 2015

An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization.
IEEE Trans. Mob. Comput., 2015

Sensing Human-Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones.
IEEE Trans. Mob. Comput., 2015

User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems.
IEEE Trans. Mob. Comput., 2015

A Low-Cost Wi-Fi-Based Solution for Measuring Human Queues.
GetMobile, 2015

Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones.
Ad Hoc & Sensor Wireless Networks, 2015

Sensing Ambient Light for User Experience-Oriented Color Scheme Adaptation on Smartphone Displays.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Toward Detection of Unsafe Driving with Wearables.
Proceedings of the 2015 workshop on Wearable Systems and Applications, 2015

Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Snooping Keystrokes with mm-level Audio Ranging on a Single Phone.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Fine-grained sleep monitoring: Hearing your breathing with smartphones.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Towards Understanding the Advertiser's Perspective of Smartphone User Privacy.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Critical segment based real-time E-signature for securing mobile transactions.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Pervasive Wireless Environments: Detecting and Localizing User Spoofing
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-07356-9, 2014

A Study of Localization Accuracy Using Multiple Frequencies and Powers.
IEEE Trans. Parallel Distrib. Syst., 2014

Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation.
IEEE Trans. Mob. Comput., 2014

Accurate WiFi Based Localization for Smartphones Using Peer Assistance.
IEEE Trans. Mob. Comput., 2014

Tracking human queues using single-point signal monitoring.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Poster: hearing your breathing: fine-grained sleep monitoring using smartphones.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Robot-assisted human indoor localization using the Kinect sensor and smartphones.
Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2014

Multi-lateral privacy-preserving localization in pervasive environments.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environments.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing.
Proceedings of the IEEE Global Communications Conference, 2014

Accurate rogue access point localization leveraging fine-grained channel information.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Practical user authentication leveraging channel state information (CSI).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks.
IEEE Trans. Parallel Distrib. Syst., 2013

E3: energy-efficient engine for frame rate adaptation on smartphones.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

Smartphone based user verification leveraging gait recognition for mobile healthcare systems.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

Sensing vehicle dynamics for determining driver phone use.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Measuring human queues using WiFi signals.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

Proactive call drop avoidance in UMTS networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Adaptive device-free passive localization coping with dynamic target speed.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Fast and practical secret key extraction by exploiting channel response.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Towards self-healing smart grid via intelligent local controller switching under jamming.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Achieving robust wireless localization resilient to signal strength attacks.
Wireless Networks, 2012

Sensing Driver Phone Use with Acoustic Ranging through Car Speakers.
IEEE Trans. Mob. Comput., 2012

Toward attack-resistant localization under infrastructure attacks.
Security and Communication Networks, 2012

Securing Mobile Location-based Services through position verification leveraging key distribution.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Push the limit of WiFi based localization for smartphones.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments.
Ad Hoc & Sensor Wireless Networks, 2011

Tracking vehicular speed variations by warping mobile phone signal strengths.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Detecting driver phone use leveraging car speakers.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Designing localization algorithms robust to signal strength attacks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching.
Proceedings of the Global Communications Conference, 2011

2010
Detecting wormhole attacks in delay-tolerant networks.
IEEE Wireless Commun., 2010

Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks.
IEEE Trans. Vehicular Technology, 2010

Empirical Evaluation of Wireless Localization when Using Multiple Antennas.
IEEE Trans. Parallel Distrib. Syst., 2010

A social community based approach for reducing the propagation of infectious diseases in healthcare.
Mobile Computing and Communications Review, 2010

A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks.
EURASIP J. Wireless Comm. and Networking, 2010

Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Mobile Sensing Enabled Robust Detection of Security Threats in Urban Environments.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

Characterizing the impact of multi-frequency and multi-power on localization accuracy.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Accuracy characterization of cell tower localization.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Vehicular speed estimation using received signal strength from mobile phones.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

2009
DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices.
IEEE Trans. Mob. Comput., 2009

Detecting Spoofing Attacks in Mobile Wireless Environments.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Empirical Evaluation of the Limits on Localization Using Signal Strength.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Indoor Localization Using Improved RSS-Based Lateration Methods.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
The Impact of Using Multiple Antennas on Wireless Localization.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Detecting sybil attacks inwireless and sensor networks using cluster analysis.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

DECODE : Detecting co-moving wireless devices.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

A theoretical analysis of wireless localization using RF-based fingerprint matching.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008


  Loading...