Yingying Chen

According to our database1, Yingying Chen authored at least 167 papers between 2006 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones.
IEEE/ACM Trans. Netw., 2019

Implications of smartphone user privacy leakage from the advertiser's perspective.
Pervasive and Mobile Computing, 2019

BreathListener: Fine-grained Breathing Monitoring in Driving Environments Utilizing Acoustic Signals.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019

WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

KeyLiSterber: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2018
Sensing Vehicle Conditions for Detecting Driving Behaviors
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-319-89769-1, 2018

Leveraging Audio Signals for Early Recognition of Inattentive Driving with Smartphones.
IEEE Trans. Mob. Comput., 2018

Personal PIN Leakage from Wearable Devices.
IEEE Trans. Mob. Comput., 2018

Authenticating Users Through Fine-Grained Channel Information.
IEEE Trans. Mob. Comput., 2018

Robot-assisted smartphone localization for human indoor tracking.
Robotics and Autonomous Systems, 2018

Monitoring Vital Signs and Postures During Sleep Using WiFi Signals.
IEEE Internet of Things Journal, 2018

RF-Kinect: A Wearable RFID-based Approach Towards 3D Body Movement Tracking.
IMWUT, 2018

Device-free Personalized Fitness Assistant Using WiFi.
IMWUT, 2018

Behavior Recognition Based on Wi-Fi CSI: Part 2.
IEEE Communications Magazine, 2018

SteerTrack: Acoustic-Based Device-Free Steering Tracking Leveraging Smartphones.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Your Heart Won't Lie: PPG-based Continuous Authentication on Wrist-worn Wearable Devices.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Poster: Inferring Mobile Payment Passcodes Leveraging Wearable Devices.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Poster: Your Phone Tells Us The Truth: Driver Identification Using Smartphone on One Turn.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Poster: Leveraging Breathing for Continuous User Authentication.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Session details: Keynote Address II.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

PPG-based Finger-level Gesture Recognition Leveraging Wearables.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Multi - Touch in the Air: Device-Free Finger Tracking and Gesture Recognition via COTS RFID.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Towards In-baggage Suspicious Object Detection Using Commodity WiFi.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Fine-Grained Abnormal Driving Behaviors Detection and Identification with Smartphones.
IEEE Trans. Mob. Comput., 2017

Color Scheme Adaptation to Enhance User Experience on Smartphone Displays Leveraging Ambient Light.
IEEE Trans. Mob. Comput., 2017

Locating Rogue Access Point Using Fine-Grained Channel Information.
IEEE Trans. Mob. Comput., 2017

Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching.
IEEE Trans. Dependable Sec. Comput., 2017

Signal Processing for Smart Vehicle Technologies: Part 2 [From the Guest Editors].
IEEE Signal Process. Mag., 2017

Behavior Recognition Based on Wi-Fi CSI: Part 1.
IEEE Communications Magazine, 2017

WiFi-Enabled Smart Human Dynamics Monitoring.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

VibSense: Sensing Touches on Ubiquitous Surfaces through Vibration.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

BigRoad: Scaling Road Data Acquisition for Dependable Self-Driving.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

SubTrack: Enabling Real-Time Tracking of Subway Riding on Mobile Devices.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

SalsaAsst: Beat Counting System Empowered by Mobile Devices to Assist Salsa Dancers.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

ER: Early recognition of inattentive driving leveraging audio devices on smartphones.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

FitCoach: Virtual fitness coach empowered by wearable mobile devices.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Secret key distribution leveraging color shift over visible light channel.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors.
IEEE Trans. Mob. Comput., 2016

Signal Processing for Smart Vehicle Technologies [From the Guest Editors].
IEEE Signal Process. Mag., 2016

PIN number-based authentication leveraging physical vibration: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

VibKeyboard: virtual keyboard leveraging physical vibration: demo.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Sensing on ubiquitous surfaces via vibration signals: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Towards safer texting while driving through stop time prediction.
Proceedings of the First ACM International Workshop on Smart, 2016

HearHere: smartphone based audio localization using time difference of arrival: demo.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Automatic personal fitness assistance through wearable mobile devices: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Leveraging wearables for steering and driver tracking.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Uber-in-light: Unobtrusive visible light communication leveraging complementary color channel.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Motion Scale: A Body Motion Monitoring System Using Bed-Mounted Wireless Load Cells.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS).
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Distributed Consensus-Based Weight Design for Cooperative Spectrum Sensing.
IEEE Trans. Parallel Distrib. Syst., 2015

Protecting Multi-Lateral Localization Privacy in Pervasive Environments.
IEEE/ACM Trans. Netw., 2015

An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization.
IEEE Trans. Mob. Comput., 2015

Sensing Human-Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones.
IEEE Trans. Mob. Comput., 2015

User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems.
IEEE Trans. Mob. Comput., 2015

A Low-Cost Wi-Fi-Based Solution for Measuring Human Queues.
GetMobile, 2015

SECO: Secure and scalable data collaboration services in cloud computing.
Computers & Security, 2015

Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones.
Ad Hoc & Sensor Wireless Networks, 2015

Sensing Ambient Light for User Experience-Oriented Color Scheme Adaptation on Smartphone Displays.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

D3: Abnormal driving behaviors detection and identification using smartphone sensors.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Toward Detection of Unsafe Driving with Wearables.
Proceedings of the 2015 workshop on Wearable Systems and Applications, 2015

Video: LookUp!: Enabling Pedestrian Safety Services via Shoe Sensing.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

LookUp: Enabling Pedestrian Safety Services via Shoe Sensing.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Snooping Keystrokes with mm-level Audio Ranging on a Single Phone.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Fine-grained sleep monitoring: Hearing your breathing with smartphones.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Towards Understanding the Advertiser's Perspective of Smartphone User Privacy.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Critical segment based real-time E-signature for securing mobile transactions.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Pervasive Wireless Environments: Detecting and Localizing User Spoofing
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-07356-9, 2014

Incentive Based Data Sharing in Delay Tolerant Mobile Networks.
IEEE Trans. Wireless Communications, 2014

A Study of Localization Accuracy Using Multiple Frequencies and Powers.
IEEE Trans. Parallel Distrib. Syst., 2014

An Error-Minimizing Framework for Localizing Jammers in Wireless Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks.
TOSN, 2014

Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation.
IEEE Trans. Mob. Comput., 2014

Accurate WiFi Based Localization for Smartphones Using Peer Assistance.
IEEE Trans. Mob. Comput., 2014

Leveraging Wi-Fi Signals to Monitor Human Queues.
IEEE Pervasive Computing, 2014

Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing.
Computers & Security, 2014

Tracking human queues using single-point signal monitoring.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

On the limits of positioning-based pedestrian risk awareness.
Proceedings of the 2014 Workshop on Mobile Augmented Reality and Robotic Technology-Based Systems, 2014

E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Poster: hearing your breathing: fine-grained sleep monitoring using smartphones.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Robot-assisted human indoor localization using the Kinect sensor and smartphones.
Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2014

Multi-lateral privacy-preserving localization in pervasive environments.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environments.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing.
Proceedings of the IEEE Global Communications Conference, 2014

Accurate rogue access point localization leveraging fine-grained channel information.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Practical user authentication leveraging channel state information (CSI).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Detection of On-Road Vehicles Emanating GPS Interference.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Neighborhood prediction based decentralized key management for mobile wireless networks.
Wireless Networks, 2013

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks.
IEEE Trans. Parallel Distrib. Syst., 2013

E3: energy-efficient engine for frame rate adaptation on smartphones.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

Smartphone based user verification leveraging gait recognition for mobile healthcare systems.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

Sensing vehicle dynamics for determining driver phone use.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Measuring human queues using WiFi signals.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

Achieving secure and efficient data collaboration in cloud computing.
Proceedings of the 21st IEEE/ACM International Symposium on Quality of Service, 2013

Proactive call drop avoidance in UMTS networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Adaptive device-free passive localization coping with dynamic target speed.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Fast and practical secret key extraction by exploiting channel response.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

P2E: Privacy-preserving and effective cloud data sharing service.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Towards self-healing smart grid via intelligent local controller switching under jamming.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Achieving robust wireless localization resilient to signal strength attacks.
Wireless Networks, 2012

Exploiting Jamming-Caused Neighbor Changes for Jammer Localization.
IEEE Trans. Parallel Distrib. Syst., 2012

Sensing Driver Phone Use with Acoustic Ranging through Car Speakers.
IEEE Trans. Mob. Comput., 2012

Toward attack-resistant localization under infrastructure attacks.
Security and Communication Networks, 2012

Detecting anomalous spectrum usage in dynamic spectrum access networks.
Ad Hoc Networks, 2012

Securing Mobile Location-based Services through position verification leveraging key distribution.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Extracting jamming signals to locate radio interferers and jammers.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Push the limit of WiFi based localization for smartphones.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Social closeness based clone attack detection for mobile healthcare system.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Error minimizing jammer localization through smart estimation of ambient noise.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Incentive driven information sharing in delay tolerant mobile networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks.
Wireless Networks, 2011

Determining the position of a jammer using a virtual-force iterative approach.
Wireless Networks, 2011

Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments.
Ad Hoc & Sensor Wireless Networks, 2011

Tracking vehicular speed variations by warping mobile phone signal strengths.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Detecting driver phone use leveraging car speakers.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Designing localization algorithms robust to signal strength attacks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Localizing Multiple Jamming Attackers in Wireless Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Distributed Cooperative Spectrum Sensing Based on Weighted Average Consensus.
Proceedings of the Global Communications Conference, 2011

Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching.
Proceedings of the Global Communications Conference, 2011

2010
Detecting wormhole attacks in delay-tolerant networks.
IEEE Wireless Commun., 2010

Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks.
IEEE Trans. Vehicular Technology, 2010

Empirical Evaluation of Wireless Localization when Using Multiple Antennas.
IEEE Trans. Parallel Distrib. Syst., 2010

Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications.
IEEE Trans. Parallel Distrib. Syst., 2010

A social community based approach for reducing the propagation of infectious diseases in healthcare.
Mobile Computing and Communications Review, 2010

A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks.
EURASIP J. Wireless Comm. and Networking, 2010

Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Mobile Sensing Enabled Robust Detection of Security Threats in Urban Environments.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

A decentralized key management scheme via neighborhood prediction in mobile wireless networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Characterizing the impact of multi-frequency and multi-power on localization accuracy.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Accuracy characterization of cell tower localization.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Vehicular speed estimation using received signal strength from mobile phones.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010

Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges.
Proceedings of the Distributed Computing in Sensor Systems, 2010

2009
A security and robustness performance analysis of localization algorithms to signal strength attacks.
TOSN, 2009

DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices.
IEEE Trans. Mob. Comput., 2009

Detecting Spoofing Attacks in Mobile Wireless Environments.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Empirical Evaluation of the Limits on Localization Using Signal Strength.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Localizing Jammers in Wireless Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Indoor Localization Using Improved RSS-Based Lateration Methods.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Securing Emerging Wireless Systems - Lower-layer Approaches.
Springer, ISBN: 978-0-387-88490-5, 2009

2008
Exploiting environmental properties for wireless localization.
Mobile Computing and Communications Review, 2008

The Impact of Using Multiple Antennas on Wireless Localization.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Exploiting Environmental Properties for Wireless Localization and Location Aware Applications.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Detecting sybil attacks inwireless and sensor networks using cluster analysis.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

DECODE : Detecting co-moving wireless devices.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

A theoretical analysis of wireless localization using RF-based fingerprint matching.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

2007
Detecting and Localizing Wireless Spoofing Attacks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

ADLS: Attack Detection for Wireless Localization Using Least Squares.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Attack Detection in Wireless Localization.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
GRAIL: general real-time adaptable indoor localization.
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, 2006

A Practical Approach to Landmark Deployment for Indoor Localization.
Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, 2006

The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study.
Proceedings of the Distributed Computing in Sensor Systems, 2006


  Loading...