Jinsong Han

According to our database1, Jinsong Han
  • authored at least 94 papers between 2005 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
GRfid: A Device-Free RFID-Based Gesture Recognition System.
IEEE Trans. Mob. Comput., 2017

A Platform for Free-Weight Exercise Monitoring with Passive Tags.
IEEE Trans. Mob. Comput., 2017

HMRL: Relative Localization of RFID Tags with Static Devices.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Poster: Combating Multipaths to Enable RFID Sensing in Practical Environments.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Replay-resilient Physical-layer Authentication for Battery-free IoT Devices.
Proceedings of the 4th ACM Workshop on Hot Topics in Wireless, 2017

Security in Uplink MU-MIMO Networks: Poster Abstract.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

iType: Using eye gaze to enhance typing privacy.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Poster: Bidimensional Relative Localization Leveraging Interference among Passive Tags.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

Efficient CSI Correction with CFO for Uplink MU-MIMO Networks.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags.
IEEE/ACM Trans. Netw., 2016

Twins: Device-Free Object Tracking Using Passive Tags.
IEEE/ACM Trans. Netw., 2016

CBID: A Customer Behavior Identification System Using Passive Tags.
IEEE/ACM Trans. Netw., 2016

Task Assignment on Multi-Skill Oriented Spatial Crowdsourcing.
IEEE Trans. Knowl. Data Eng., 2016

E2F: Achieving Energy-efficient Flooding with Constructive Interference in WSNs.
Ad Hoc & Sensor Wireless Networks, 2016

CSI feedback reduction by checking its validity period: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

VADS: Visual attention detection with a smartphone.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Smart retransmission for CSI recovery in uplink multi-user MIMO networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Verifiable smart packaging with passive RFID.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Device-free detection of approach and departure behaviors using backscatter communication.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Instant and Robust Authentication and Key Agreement among Mobile Devices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Shelving Interference and Joint Identification in Large-Scale RFID Systems.
IEEE Trans. Parallel Distrib. Syst., 2015

Unlocking Smart Phone through Handwaving Biometrics.
IEEE Trans. Mob. Comput., 2015

WizBee: Wise ZigBee Coexistence via Interference Cancellation with Single Antenna.
IEEE Trans. Mob. Comput., 2015

Reliable Diversity-Based Spatial Crowdsourcing by Moving Workers.
PVLDB, 2015

Wireless Sensor Networks for Agriculture and Forestry.
IJDSN, 2015

Smart Sensing and Mobile Computing.
IJDSN, 2015

Task Assignment on Multi-Skill Oriented Spatial Crowdsourcing.
CoRR, 2015

ACTION: Breaking the Privacy Barrier for RFID Systems.
Ad Hoc & Sensor Wireless Networks, 2015

ShopMiner: Mining Customer Shopping Behavior in Physical Clothing Stores with COTS RFID Devices.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

FEMO: A Platform for Free-weight Exercise Monitoring with RFIDs.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Is My Cheese Moved?: An RF based "X-raying" Method for Trustworthy Item-identification.
Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication, 2015

Human object estimation via backscattered radio frequency signal.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Predicting driver lane change intent using HCRF.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2015

EMoD: Efficient Motion Detection of Device-Free Objects Using Passive RFID Tags.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

NFV: Near Field Vibration Based Group Device Pairing.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

2014
Device-Free Object Tracking Using Passive Tags
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-319-12646-3, 2014

OTrack: Towards Order Tracking for Tags in Mobile RFID Systems.
IEEE Trans. Parallel Distrib. Syst., 2014

Efficient and secure key extraction using channel state information.
The Journal of Supercomputing, 2014

Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation.
J. Comput. Sci. Technol., 2014

Reliable Diversity-Based Spatial Crowdsourcing by Moving Workers.
CoRR, 2014

Exploiting RF Interference for Private Cardinality Estimation in RFID System.
Ad Hoc & Sensor Wireless Networks, 2014

Poster: locating RFID tags by rotation.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

KEEP: Fast secret key extraction protocol for D2D communication.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Twins: Device-free object tracking using passive tags.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Nowhere to hide: An empirical study on hidden UHF RFID tags.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

A fine-grained indoor localization using multidimensional Wi-Fi fingerprinting.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

CBID: A Customer Behavior Identification System Using Passive Tags.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

2013
MAP: Towards Authentication for Multiple Tags.
IJDSN, 2013

Secure and Efficient Control Transfer for IoT Devices.
IJDSN, 2013

Tracer: Taming Anomalous Events with CRFID Tags for Trajectory Management.
IJDSN, 2013

Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-based Speed Estimation.
CoRR, 2013

Twins: Device-free Object Tracking using Passive Tags.
CoRR, 2013

Wi-Fi Fingerprint Based Indoor Localization without Indoor Space Measurement.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

MISS: Multi-dimensional Information Sensing Surveillance for Cold Chain Logistics.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

OpenSesame: Unlocking smart phone through handshaking biometrics.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

GenePrint: Generic and accurate physical-layer identification for UHF RFID tags.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Collision-driven physical-layer identification of RFID UHF tags.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

2012
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays.
IEEE Trans. Parallel Distrib. Syst., 2012

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
IJDSN, 2012

Improving Accuracy for 3D RFID Localization.
IJDSN, 2012

Efficient and Secure Key Extraction using CSI without Chasing down Errors
CoRR, 2012

Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information
CoRR, 2012

2011
Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems.
IEEE Trans. Parallel Distrib. Syst., 2011

Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems.
IJAHUC, 2011

MAP: Authenticating Multiple-Tags.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Season: Shelving interference and joint identification in large-scale RFID systems.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Privacy Leakage in Access Mode: Revisiting Private RFID Authentication Protocols.
Proceedings of the International Conference on Parallel Processing, 2011

2010
Efficient Data Retrieving in Distributed Data-streaming Environments.
Ad Hoc & Sensor Wireless Networks, 2010

Revisting Tag Collision Problem in RFID Systems.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Utilizing RF Interference to Enable Private Estimation in RFID Systems.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Identification-free batch authentication for RFID tags.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

2009
Multiscale Representations for Fast Pattern Matching in Stream Time Series.
IEEE Trans. Knowl. Data Eng., 2009

Popularity adaptive search in hybrid P2P systems.
J. Parallel Distrib. Comput., 2009

Randomizing RFID Private Authentication.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An Enhanced Synchronization Approach for RFID Private Authentication.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

ACTION: Breaking the Privacy Barrier for RFID Systems.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps.
IEEE Trans. Parallel Distrib. Syst., 2008

Mutual Anonymity for Mobile P2P Systems.
IEEE Trans. Parallel Distrib. Syst., 2008

Road Network Based Adaptive Query Evaluation in VANET.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008

DHT-assisted probabilistic exhaustive search in unstructured P2P networks.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

2007
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

Popularity Adaptive Search in Hybrid P2P Systems.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

2006
Dubious feedback: fair or not?
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

HAND: An Overlay Optimization Algorithm in Peer-to-Peer Systems.
Proceedings of the High Performance Computing and Communications, 2006

Popularity Biased Hybrid Search in P2P Systems.
Proceedings of the Grid and Cooperative Computing, 2006

2005
A Mutual Anonymous Peer-to-Peer Protocol Design.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

TruGrid: A Self-Sustaining Trustworthy Grid.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Provide Privacy for Mobile P2P Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A Random Walk Based Anonymous Peer-to-Peer Protocol Design.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Efficient data retrieving in distributed data-streaming environments.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005


  Loading...