Jinsong Han

Orcid: 0000-0001-5064-1955

According to our database1, Jinsong Han authored at least 164 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exploring Polarization in Hybrid Modulation for LED-Camera Communication.
IEEE Trans. Mob. Comput., May, 2024

Anti-Spoofing Facial Authentication Based on COTS RFID.
IEEE Trans. Mob. Comput., May, 2024

Exploring Practical Acoustic Transduction Attacks on Inertial Sensors in MDOF Systems.
IEEE Trans. Mob. Comput., May, 2024

U-Shape Networks Are Unified Backbones for Human Action Understanding From Wi-Fi Signals.
IEEE Internet Things J., March, 2024

XRF55: A Radio Frequency Dataset for Human Indoor Action Analysis.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2024

A Resilience Evaluation Framework on Ultrasonic Microphone Jammers.
IEEE Trans. Mob. Comput., February, 2024

Privacy Leakage in Wireless Charging.
IEEE Trans. Dependable Secur. Comput., 2024

Time to Think the Security of WiFi-Based Behavior Recognition Systems.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Secure User Verification and Continuous Authentication via Earphone IMU.
IEEE Trans. Mob. Comput., November, 2023

Reliable Multi-Factor User Authentication With One Single Finger Swipe.
IEEE/ACM Trans. Netw., June, 2023

Mobile Communication Among COTS IoT Devices via a Resonant Gyroscope With Ultrasound.
IEEE/ACM Trans. Netw., June, 2023

ShakeReader: 'Read' UHF RFID Using Smartphone.
IEEE Trans. Mob. Comput., March, 2023

A Generalized Method to Combat Multipaths for RFID Sensing.
IEEE/ACM Trans. Netw., February, 2023

Behavior Privacy Preserving in RF Sensing.
IEEE Trans. Dependable Secur. Comput., 2023

Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope.
IEEE Trans. Dependable Secur. Comput., 2023

μMote: Enabling Passive Chirp De-spreading and μW-level Long-Range Downlink for Backscatter Devices.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

SenCom: Integrated Sensing and Communication with Practical WiFi.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

Cancelling Speech Signals for Speech Privacy Protection against Microphone Eavesdropping.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

MagTracer: Detecting GPU Cryptojacking Attacks via Magnetic Leakage Signals.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

WiHunter: Enabling Real-time Small Object Detection via Wireless Sensing.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

mmRipple: Communicating with mmWave Radars through Smartphone Vibration.
Proceedings of the 22nd International Conference on Information Processing in Sensor Networks, 2023

Breaking the Throughput Limit of LED-Camera Communication via Superposed Polarization.
Proceedings of the IEEE INFOCOM 2023, 2023

Expelliarmus: Command Cancellation Attacks on Smartphones using Electromagnetic Interference.
Proceedings of the IEEE INFOCOM 2023, 2023

Nowhere to Hide: Detecting Live Video Forgery via Vision-WiFi Silhouette Correspondence.
Proceedings of the IEEE INFOCOM 2023, 2023

2022
A Fingertip Profiled RF Identifier.
IEEE Trans. Mob. Comput., 2022

Arbitrator2.0: Preventing Unauthorized Access on Passive Tags.
IEEE Trans. Mob. Comput., 2022

Axial Stress Measurement of Steel Tubes Using Ultrasonic Guided Waves.
Sensors, 2022

Crack Detection of Threaded Steel Rods Based on Ultrasonic Guided Waves.
Sensors, 2022

KITE: Exploring the Practical Threat from Acoustic Transduction Attacks on Inertial Sensors.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Integrated Sensing and Communication between Daily Devices and mmWave Radars.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

ChopTags: An Accurate and Low-cost Interface to Identify User/Item Interactions.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Mask does not matter: anti-spoofing face authentication using mmWave without on-site registration.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Physical-World Attack towards WiFi-based Behavior Recognition.
Proceedings of the IEEE INFOCOM 2022, 2022

InertiEAR: Automatic and Device-independent IMU-based Eavesdropping on Smartphones.
Proceedings of the IEEE INFOCOM 2022, 2022

Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers.
Proceedings of the IEEE INFOCOM 2022, 2022

ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Device-free Crowd Density Estimation with Off-the-shelf WiFi Traffic.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

2021
Corrections to "HMO: Ordering RFID Tags With Static Devices in Mobile Environments".
IEEE Trans. Mob. Comput., 2021

Implement of a secure selective ultrasonic microphone jammer.
CCF Trans. Pervasive Comput. Interact., 2021

OneFi: One-Shot Recognition for Unseen Gesture via COTS WiFi.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

Wavoice: A Noise-resistant Multi-modal Speech Recognition System Fusing mmWave and Audio Signals.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

A Behavior Privacy Preserving Method towards RF Sensing.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

RFace: Anti-Spoofing Facial Authentication Using COTS RFID.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Hand-Key: Leveraging Multiple Hand Biometrics for Attack-Resilient User Authentication Using COTS RFID.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

MandiPass: Secure and Usable User Authentication via Earphone IMU.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

2020
Multi-Variations Activity Based Gaits Recognition Using Commodity WiFi.
IEEE Trans. Veh. Technol., 2020

Hu-Fu: Replay-Resilient RFID Authentication.
IEEE/ACM Trans. Netw., 2020

HMO: Ordering RFID Tags with Static Devices in Mobile Environments.
IEEE Trans. Mob. Comput., 2020

A Framework for Behavior Privacy Preserving in Radio Frequency Signal.
CoRR, 2020

Adversary Helps: Gradient-based Device-Free Domain-Independent Gesture Recognition.
CoRR, 2020

Underwater cooperative MIMO communications using hybrid acoustic and magnetic induction technique.
Comput. Networks, 2020

Deaf-aid: mobile IoT communication exploiting stealthy speaker-to-gyroscope channel.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

BioDraw: Reliable Multi-Factor User Authentication with One Single Finger Swipe.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

A Universal Method to Combat Multipaths for RFID Sensing.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Verifiable Smart Packaging with Passive RFID.
IEEE Trans. Mob. Comput., 2019

Counting Human Objects Using Backscattered Radio Frequency Signals.
IEEE Trans. Mob. Comput., 2019

Close-Proximity Detection for Hand Approaching Using Backscatter Communication.
IEEE Trans. Mob. Comput., 2019

Continuous User Authentication by Contactless Wireless Sensing.
IEEE Internet Things J., 2019

Temporal Unet: Sample Level Human Action Recognition using WiFi.
CoRR, 2019

Joint Activity Recognition and Indoor Localization.
CoRR, 2019

Can WiFi Estimate Person Pose?
CoRR, 2019

Joint Activity Recognition and Indoor Localization With WiFi Fingerprints.
IEEE Access, 2019

RF-Mehndi: A Fingertip Profiled RF Identifier.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

A (Near) Zero-cost and Universal Method to Combat Multipaths for RFID Sensing.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Person-in-WiFi: Fine-Grained Person Perception Using WiFi.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

WiPIN: Operation-Free Passive Person Identification Using Wi-Fi Signals.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Trustworthy Authentication for IoT with Human-and-Environment-in-the-Loop.
Proceedings of the Fourth International Workshop on Social Sensing, 2019

2018
Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

WiPIN: Operation-free Person Identification using WiFi Signals.
CoRR, 2018

CSI-Net: Unified Human Body Characterization and Action Recognition.
CoRR, 2018

Towards Replay-resilient RFID Authentication.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Replay-resilient Authentication for IoT.
Proceedings of the 10th on Wireless of the Students, 2018

Preventing Unauthorized Access on Passive Tags.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Trio: Utilizing Tag Interference for Refined Localization of Passive RFID.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
GRfid: A Device-Free RFID-Based Gesture Recognition System.
IEEE Trans. Mob. Comput., 2017

A Platform for Free-Weight Exercise Monitoring with Passive Tags.
IEEE Trans. Mob. Comput., 2017

HMRL: Relative Localization of RFID Tags with Static Devices.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Poster: Combating Multipaths to Enable RFID Sensing in Practical Environments.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Replay-resilient Physical-layer Authentication for Battery-free IoT Devices.
Proceedings of the 4th ACM Workshop on Hot Topics in Wireless, 2017

Security in Uplink MU-MIMO Networks: Poster Abstract.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

iType: Using eye gaze to enhance typing privacy.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Poster: Bidimensional Relative Localization Leveraging Interference among Passive Tags.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

Efficient CSI Correction with CFO for Uplink MU-MIMO Networks.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags.
IEEE/ACM Trans. Netw., 2016

Twins: Device-Free Object Tracking Using Passive Tags.
IEEE/ACM Trans. Netw., 2016

CBID: A Customer Behavior Identification System Using Passive Tags.
IEEE/ACM Trans. Netw., 2016

Task Assignment on Multi-Skill Oriented Spatial Crowdsourcing.
IEEE Trans. Knowl. Data Eng., 2016

E2F: Achieving Energy-efficient Flooding with Constructive Interference in WSNs.
Ad Hoc Sens. Wirel. Networks, 2016

CSI feedback reduction by checking its validity period: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

VADS: Visual attention detection with a smartphone.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Smart retransmission for CSI recovery in uplink multi-user MIMO networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Device-free detection of approach and departure behaviors using backscatter communication.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Instant and Robust Authentication and Key Agreement among Mobile Devices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Shelving Interference and Joint Identification in Large-Scale RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2015

Unlocking Smart Phone through Handwaving Biometrics.
IEEE Trans. Mob. Comput., 2015

WizBee: Wise ZigBee Coexistence via Interference Cancellation with Single Antenna.
IEEE Trans. Mob. Comput., 2015

Reliable Diversity-Based Spatial Crowdsourcing by Moving Workers.
Proc. VLDB Endow., 2015

Wireless Sensor Networks for Agriculture and Forestry.
Int. J. Distributed Sens. Networks, 2015

Smart Sensing and Mobile Computing.
Int. J. Distributed Sens. Networks, 2015

ACTION: Breaking the Privacy Barrier for RFID Systems.
Ad Hoc Sens. Wirel. Networks, 2015

ShopMiner: Mining Customer Shopping Behavior in Physical Clothing Stores with COTS RFID Devices.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

FEMO: A Platform for Free-weight Exercise Monitoring with RFIDs.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Is My Cheese Moved?: An RF based "X-raying" Method for Trustworthy Item-identification.
Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication, 2015

Human object estimation via backscattered radio frequency signal.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Predicting driver lane change intent using HCRF.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2015

EMoD: Efficient Motion Detection of Device-Free Objects Using Passive RFID Tags.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

NFV: Near Field Vibration Based Group Device Pairing.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

2014
Device-Free Object Tracking Using Passive Tags
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-319-12646-3, 2014

OTrack: Towards Order Tracking for Tags in Mobile RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Efficient and secure key extraction using channel state information.
J. Supercomput., 2014

Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation.
J. Comput. Sci. Technol., 2014

Reliable Diversity-Based Spatial Crowdsourcing by Moving Workers.
CoRR, 2014

Exploiting RF Interference for Private Cardinality Estimation in RFID System.
Ad Hoc Sens. Wirel. Networks, 2014

Poster: locating RFID tags by rotation.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

KEEP: Fast secret key extraction protocol for D2D communication.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Twins: Device-free object tracking using passive tags.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Nowhere to hide: An empirical study on hidden UHF RFID tags.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

A fine-grained indoor localization using multidimensional Wi-Fi fingerprinting.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

CBID: A Customer Behavior Identification System Using Passive Tags.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

2013
MAP: Towards Authentication for Multiple Tags.
Int. J. Distributed Sens. Networks, 2013

Secure and Efficient Control Transfer for IoT Devices.
Int. J. Distributed Sens. Networks, 2013

Tracer: Taming Anomalous Events with CRFID Tags for Trajectory Management.
Int. J. Distributed Sens. Networks, 2013

Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-based Speed Estimation.
CoRR, 2013

Wi-Fi Fingerprint Based Indoor Localization without Indoor Space Measurement.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

MISS: Multi-dimensional Information Sensing Surveillance for Cold Chain Logistics.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

OpenSesame: Unlocking smart phone through handshaking biometrics.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

GenePrint: Generic and accurate physical-layer identification for UHF RFID tags.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Collision-driven physical-layer identification of RFID UHF tags.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

2012
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays.
IEEE Trans. Parallel Distributed Syst., 2012

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
Int. J. Distributed Sens. Networks, 2012

Improving Accuracy for 3D RFID Localization.
Int. J. Distributed Sens. Networks, 2012

Efficient and Secure Key Extraction using CSI without Chasing down Errors
CoRR, 2012

2011
Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems.
IEEE Trans. Parallel Distributed Syst., 2011

Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems.
Int. J. Ad Hoc Ubiquitous Comput., 2011

MAP: Authenticating Multiple-Tags.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Season: Shelving interference and joint identification in large-scale RFID systems.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Privacy Leakage in Access Mode: Revisiting Private RFID Authentication Protocols.
Proceedings of the International Conference on Parallel Processing, 2011

2010
Efficient Data Retrieving in Distributed Data-streaming Environments.
Ad Hoc Sens. Wirel. Networks, 2010

Revisting Tag Collision Problem in RFID Systems.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Utilizing RF Interference to Enable Private Estimation in RFID Systems.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Identification-free batch authentication for RFID tags.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

2009
Multiscale Representations for Fast Pattern Matching in Stream Time Series.
IEEE Trans. Knowl. Data Eng., 2009

Popularity adaptive search in hybrid P2P systems.
J. Parallel Distributed Comput., 2009

Randomizing RFID Private Authentication.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An Enhanced Synchronization Approach for RFID Private Authentication.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

ACTION: Breaking the Privacy Barrier for RFID Systems.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps.
IEEE Trans. Parallel Distributed Syst., 2008

Mutual Anonymity for Mobile P2P Systems.
IEEE Trans. Parallel Distributed Syst., 2008

Road Network Based Adaptive Query Evaluation in VANET.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008

DHT-assisted probabilistic exhaustive search in unstructured P2P networks.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

2007
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

2006
Dubious feedback: fair or not?
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

HAND: An Overlay Optimization Algorithm in Peer-to-Peer Systems.
Proceedings of the High Performance Computing and Communications, 2006

Popularity Biased Hybrid Search in P2P Systems.
Proceedings of the Grid and Cooperative Computing, 2006

2005
A Mutual Anonymous Peer-to-Peer Protocol Design.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

TruGrid: A Self-Sustaining Trustworthy Grid.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Provide Privacy for Mobile P2P Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A Random Walk Based Anonymous Peer-to-Peer Protocol Design.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Efficient data retrieving in distributed data-streaming environments.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005


  Loading...