default search action
Jie Yang 0003
Person information
- affiliation: Florida State University, Tallahassee, FL, USA
- affiliation (PhD 2011): Stevens Institute of Technology, Hoboken, NJ, USA
Other persons with the same name
- Jie Yang — disambiguation page
- Jie Yang 0001 — Carnegie Mellon University, Pittsburgh, PA, USA
- Jie Yang 0002 — Shanghai Jiao Tong University, Institute of Image Processing and Pattern Recognition, China (and 1 more)
- Jie Yang 0004 — University of Science and Technology of China, Department of Precision Machinery and Precision Instrumentation, Hefei, China
- Jie Yang 0005 — University of Massachusetts (and 1 more)
- Jie Yang 0006 — Ishizuka Lab, Tokyo University (and 1 more)
- Jie Yang 0007 — Dalian University of Technology, School of Mathematical Sciences, China
- Jie Yang 0008 — Cisco Systems (and 1 more)
- Jie Yang 0009 (aka: Jie (Jack) Yang) — University of Wollongong, SMART Infrastructure Facility, NSW, Australia
- Jie Yang 0010 — Advanced Micro Devices (and 1 more)
- Jie Yang 0011 — Xidian University, Key Lab of Intelligent Perception and Image Understanding of Ministry of Education of China, China
- Jie Yang 0012 — University of Houston-Victoria (and 1 more)
- Jie Yang 0013 — Syracuse University
- Jie Yang 0014 — IBM China Research Lab (and 1 more)
- Jie Yang 0015 — Yahoo! Labs (and 1 more)
- Jie Yang 0016 — South China University of Technology
- Jie Yang 0017 — Huazhong University of Science and Technology
- Jie Yang 0018 — Beijing Institute of Technology
- Jie Yang 0019 — Shanghai Second Polytechnic University
- Jie Yang 0020 — School of Business, Sun Yat-sen University
- Jie Yang 0021 — Wichita State University
- Jie Yang 0022 — Wuhan University of Technology, Key Laboratory of Fiber Optic Sensing Technology and Information Processing
- Jie Yang 0023 — Beijing University of Posts and Telecommunications, School of Information and Communication Engineering, Research Center of Network Monitoring and Analysis, Beijing Laboratory of Advanced Information Networks / Beijing Key Laboratory of Network System, Architecture and Convergence, China
- Jie Yang 0024 — Yanshan University, School of Electrical Engineering, Qinhuangdao, Hebei, China (and 1 more)
- Jie Yang 0025 — Southeast University, Development Research Center of Transportation Governed by Law, Nanjing, China
- Jie Yang 0026 — Jiangxi University of Science and Technology, Ganzhou, China (and 1 more)
- Jie Yang 0027 — Nanjing University of Posts and Telecommunications, College of Telecommunications and Information Engineering, China
- Jie Yang 0028 — Delft University of Technology, The Netherlands (and 3 more)
- Jie Yang 0029 — Hunan University, College of Computer Science and Electronic Engineering, China
- Jie Yang 0030 — Temple University, School of Dentistry, Division of Oral and Maxillofacial Radiology, Philadelphia, USA
- Jie Yang 0031 — Anhui University, School of Physics & Material Science, Hefei, China
- Jie Yang 0032 — Xidian University, Institute of Intelligent Information Processing, Xi'an, China
- Jie Yang 0033 — Westlake University, Hangzhou, China (and 2 more)
- Jie Yang 0034 — Zhejiang A & F University, Jiyang College, Zhuji, China (and 1 more)
- Jie Yang 0035 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China
- Jie Yang 0036 — RMIT University, School of Aerospace, Mechanical and Manufacturing Engineering, Melbourne, VIC, Australia
- Jie Yang 0037 — North University of China, Shanxi Provincial Key Laboratory for Biomedical Imaging and Big Data, Taiyuan, China
- Jie Yang 0038 — Institute of Computing Technolgy, Chinese Academy of Sciences, Beijing, China (and 1 more)
- Jie Yang 0039 — Harvard University, Harvard Medical School, USA (and 1 more)
- Jie Yang 0040 — Wuhan University, LIESMARS, China
- Jie Yang 0041 — Columbia University, Department of Biomedical Engineering, NY, USA
- Jie Yang 0042 — Nanjing Institute of Technology, School of Communication Engineering, China
- Jie Yang 0043 — Xi'an University of Technology, Institute of Water Resources and Hydro-Electric Engineering, China
- Jie Yang 0044 — Chongqing University, College of Computer Science, China
- Jie Yang 0045 — Northwestern University, Department of Civil and Environmental Engineering, Evanston, IL, USA
- Jie Yang 0046 — Northeastern University, State Key Laboratory of Synthetical Automation for Process Industries, Shenyang, China
- Jie Yang 0047 — Fujian Agriculture and Forestry University, College of Management, Fuzhou, China (and 1 more)
- Jie Yang 0048 — Hangzhou Dianzi University, Management School, China (and 3 more)
- Jie Yang 0049 — Chongqing University of Technology, College of Mechanical Engineering, China (and 1 more)
- Jie Yang 0050 — Nanjing University of Posts and Telecommunications, College of Electronic and Optical Engineering, China
- Jie Yang 0051 — Hangzhou Dianzi University, Key Lab for IOT and Information Fusion Technology of Zhejiang, China (and 1 more)
- Jie Yang 0052 — Zunyi Normal University, School of Physics and Electronic Science, China (and 1 more)
- Jie Yang 0053 — PLA Strategy Support Force Information Engineering University, School of Information Systems Engineering, Zhengzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Yichao Wang, Yili Ren, Jie Yang:
Multi-Subject 3D Human Mesh Construction Using Commodity WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(1): 23:1-23:25 (2024) - [j40]Zi Wang, Yilin Wang, Jie Yang:
EarSlide: a Secure Ear Wearables Biometric Authentication Based on Acoustic Fingerprint. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(1): 24:1-24:29 (2024) - [j39]Bofan Li, Yili Ren, Yichao Wang, Jie Yang:
SpaceBeat: Identity-aware Multi-person Vital Signs Monitoring Using Commodity WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(3): 113:1-113:23 (2024) - [c72]Yuqiao Yang, Zhongjie Wu, Yongzhao Zhang, Ting Chen, Jun Li, Jie Yang, Wenhao Liu, Xiaosong Zhang, Ruicong Shi, Jingwei Li, Yu Jiang, Zhuo Su:
UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips. CCS 2024: 3376-3390 - 2023
- [j38]Linghan Zhang, Sheng Tan, Yingying Chen, Jie Yang:
A Phoneme Localization Based Liveness Detection for Text-Independent Speaker Verification. IEEE Trans. Mob. Comput. 22(10): 5611-5624 (2023) - [c71]Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
Person Re-identification in 3D Space: A WiFi Vision-based Approach. USENIX Security Symposium 2023: 5217-5234 - 2022
- [j37]Yili Ren, Zi Wang, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
GoPose: 3D Human Pose Estimation Using WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 69:1-69:25 (2022) - [j36]Zi Wang, Yili Ren, Yingying Chen, Jie Yang:
ToothSonic: Earable Authentication via Acoustic Toothprint. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 78:1-78:24 (2022) - [j35]Sheng Tan, Yili Ren, Jie Yang, Yingying Chen:
Commodity WiFi Sensing in Ten Years: Status, Challenges, and Opportunities. IEEE Internet Things J. 9(18): 17832-17843 (2022) - [j34]Linghan Zhang, Sheng Tan, Yingying Chen, Jie Yang:
A Continuous Articulatory-Gesture-Based Liveness Detection for Voice Authentication on Smart Devices. IEEE Internet Things J. 9(23): 23320-23331 (2022) - [j33]Sheng Tan, Jie Yang, Yingying Chen:
Enabling Fine-Grained Finger Gesture Recognition on Commodity WiFi Devices. IEEE Trans. Mob. Comput. 21(8): 2789-2802 (2022) - [c70]Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
Poster: A WiFi Vision-based Approach to Person Re-identification. CCS 2022: 3443-3445 - [c69]Zi Wang, Yilin Wang, Yingying Chen, Jie Yang:
Poster: Fingerprint-Face Friction Based Earable Authentication. CCS 2022: 3487-3489 - [c68]Zi Wang, Yili Ren, Yingying Chen, Jie Yang:
Excerpt of ToothSonic: Earable Authentication via Acoustic Toothprint. UbiComp/ISWC Adjunct 2022: 261-262 - [c67]Yichao Wang, Yili Ren, Yingying Chen, Jie Yang:
A wifi vision-based 3D human mesh reconstruction. MobiCom 2022: 814-816 - [c66]Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
Person re-identification using wifi signals. MobiCom 2022: 829-831 - [c65]Yili Ren, Zi Wang, Beiyu Wang, Sheng Tan, Jie Yang:
Liquid level detection using wireless signals. MobiSys 2022: 521-522 - [c64]Yichao Wang, Yili Ren, Yingying Chen, Jie Yang:
Wi-Mesh: A WiFi Vision-Based Approach for 3D Human Mesh Construction. SenSys 2022: 362-376 - [c63]Yili Ren, Yichao Wang, Yingying Chen, Jie Yang:
A Vision-Based Approach for Commodity WiFi Sensing. SenSys 2022: 800-801 - [i15]Zi Wang, Jie Yang:
Ear Wearable (Earable) User Authentication via Acoustic Toothprint. CoRR abs/2204.07199 (2022) - [i14]Yili Ren, Jie Yang:
3D Human Pose Estimation for Free-from and Moving Activities Using WiFi. CoRR abs/2204.07878 (2022) - [i13]Yili Ren, Jie Yang:
Robust Person Identification: A WiFi Vision-based Approach. CoRR abs/2210.00127 (2022) - [i12]Yichao Wang, Jie Yang:
3D Human Mesh Construction Leveraging Wi-Fi. CoRR abs/2210.10957 (2022) - 2021
- [j32]Zi Wang, Sheng Tan, Linghan Zhang, Yili Ren, Zhi Wang, Jie Yang:
EarDynamic: An Ear Canal Deformation Based Continuous User Authentication Using In-Ear Wearables. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(1): 39:1-39:27 (2021) - [j31]Yili Ren, Zi Wang, Sheng Tan, Yingying Chen, Jie Yang:
Winect: 3D Human Pose Tracking for Free-form Activity Using Commodity WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(4): 176:1-176:29 (2021) - [c62]Zi Wang, Yili Ren, Yingying Chen, Jie Yang:
Earable Authentication via Acoustic Toothprint. CCS 2021: 2390-2392 - [c61]Yili Ren, Zi Wang, Sheng Tan, Yingying Chen, Jie Yang:
Tracking free-form activity using wifi signals. MobiCom 2021: 816-818 - [c60]Zi Wang, Sheng Tan, Linghan Zhang, Yili Ren, Zhi Wang, Jie Yang:
An ear canal deformation based continuous user authentication using earables. MobiCom 2021: 819-821 - [c59]Yili Ren, Zi Wang, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
3D Human Pose Estimation Using WiFi Signals. SenSys 2021: 363-364 - [i11]Sheng Tan, Jie Yang:
Fine-grained Finger Gesture Recognition Using WiFi Signals. CoRR abs/2106.00857 (2021) - [i10]Linghan Zhang, Jie Yang:
A Continuous Liveness Detection for Voice Authentication on Smart Devices. CoRR abs/2106.00859 (2021) - [i9]Sheng Tan, Jie Yang:
Object Sensing for Fruit Ripeness Detection Using WiFi Signals. CoRR abs/2106.00860 (2021) - [i8]Sheng Tan, Jie Yang:
Multi-User Activity Recognition and Tracking Using Commodity WiFi. CoRR abs/2106.00865 (2021) - [i7]Zi Wang, Jie Yang:
Acoustic-based Object Detection for Pedestrian Using Smartphone. CoRR abs/2106.01838 (2021) - [i6]Linghan Zhang, Jie Yang:
A Continuous Liveness Detection System for Text-independent Speaker Verification. CoRR abs/2106.01840 (2021) - [i5]Yili Ren, Jie Yang:
Liquid Sensing Using WiFi Signals. CoRR abs/2106.10356 (2021) - [i4]Zi Wang, Jie Yang:
An Ear Canal Deformation Based User Authentication Using Ear Wearable Devices. CoRR abs/2108.05432 (2021) - [i3]Yili Ren, Jie Yang:
3D Human Pose Estimation for Free-form Activity Using WiFi Signals. CoRR abs/2110.08314 (2021) - [i2]Sheng Tan, Jie Yang:
Commodity Wi-Fi Sensing in 10 Years: Current Status, Challenges, and Opportunities. CoRR abs/2111.07038 (2021) - 2020
- [j30]Yili Ren, Sheng Tan, Linghan Zhang, Zi Wang, Zhi Wang, Jie Yang:
Liquid Level Sensing Using Commodity WiFi in a Smart Home Environment. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(1): 24:1-24:30 (2020) - [j29]Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Signature Verification Using Critical Segments for Securing Mobile Transactions. IEEE Trans. Mob. Comput. 19(3): 724-739 (2020) - [c58]Linghan Zhang, Sheng Tan, Zi Wang, Yili Ren, Zhi Wang, Jie Yang:
VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment. ACSAC 2020: 884-896 - [i1]Sheng Wan, Chen Gong, Shirui Pan, Jie Yang, Jian Yang:
Multi-Level Graph Convolutional Network with Automatic Graph Learning for Hyperspectral Image Classification. CoRR abs/2009.09196 (2020)
2010 – 2019
- 2019
- [j28]Yanzhi Ren, Chen Wang, Yingying Chen, Jie Yang, Hongwei Li:
Noninvasive Fine-Grained Sleep Monitoring Leveraging Smartphones. IEEE Internet Things J. 6(5): 8248-8261 (2019) - [j27]Yan Wang, Yingying Chen, Fan Ye, Hongbo Liu, Jie Yang:
Implications of smartphone user privacy leakage from the advertiser's perspective. Pervasive Mob. Comput. 53: 13-32 (2019) - [c57]Sheng Tan, Linghan Zhang, Zi Wang, Jie Yang:
MultiTrack: Multi-User Tracking and Activity Recognition Using Commodity WiFi. CHI 2019: 536 - [c56]Mustakimur Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, Jie Yang:
Origin-sensitive Control Flow Integrity. USENIX Security Symposium 2019: 195-211 - 2018
- [j26]Zi Wang, Sheng Tan, Linghan Zhang, Jie Yang:
ObstacleWatch: Acoustic-based Obstacle Collision Detection for Pedestrian Using Smartphone. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(4): 194:1-194:22 (2018) - [j25]Jian Liu, Yingying Chen, Yan Wang, Xu Chen, Jerry Cheng, Jie Yang:
Monitoring Vital Signs and Postures During Sleep Using WiFi Signals. IEEE Internet Things J. 5(3): 2071-2084 (2018) - [j24]Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen, H. Vincent Poor:
Authenticating Users Through Fine-Grained Channel Information. IEEE Trans. Mob. Comput. 17(2): 251-264 (2018) - [c55]Sheng Tan, Linghan Zhang, Jie Yang:
Sensing Fruit Ripeness Using Wireless Signals. ICCCN 2018: 1-9 - 2017
- [j23]Hongbo Liu, Yingying Chen, Mooi Choo Chuah, Jie Yang, H. Vincent Poor:
Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching. IEEE Trans. Dependable Secur. Comput. 14(4): 377-391 (2017) - [j22]Chen Wang, Xiuyuan Zheng, Yingying (Jennifer) Chen, Jie Yang:
Locating Rogue Access Point Using Fine-Grained Channel Information. IEEE Trans. Mob. Comput. 16(9): 2560-2573 (2017) - [c54]Linghan Zhang, Sheng Tan, Jie Yang:
Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication. CCS 2017: 57-71 - 2016
- [j21]Yan Wang, Yingying (Jennifer) Chen, Jie Yang, Marco Gruteser, Richard P. Martin, Hongbo Liu, Luyang Liu, Çagdas Karatas:
Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors. IEEE Trans. Mob. Comput. 15(8): 1965-1981 (2016) - [c53]Boxiang Dong, Wendy Hui Wang, Jie Yang:
Secure Data Outsourcing with Adversarial Data Dependency Constraints. BigDataSecurity/HPSC/IDS 2016: 73-78 - [c52]Linghan Zhang, Sheng Tan, Jie Yang, Yingying Chen:
VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones. CCS 2016: 1080-1091 - [c51]Çagdas Karatas, Luyang Liu, Hongyu Li, Jian Liu, Yan Wang, Sheng Tan, Jie Yang, Yingying Chen, Marco Gruteser, Richard P. Martin:
Leveraging wearables for steering and driver tracking. INFOCOM 2016: 1-9 - [c50]Sheng Tan, Jie Yang:
Fine-grained gesture recognition using WiFi. INFOCOM Workshops 2016: 257-258 - [c49]Hongyu Li, Luyang Liu, Çagdas Karatas, Jian Liu, Marco Gruteser, Yingying Chen, Yan Wang, Richard P. Martin, Jie Yang:
Towards safer texting while driving through stop time prediction. CarSys@MobiCom 2016: 14-21 - [c48]Sheng Tan, Jie Yang:
WiFinger: leveraging commodity WiFi for fine-grained finger gesture recognition. MobiHoc 2016: 201-210 - 2015
- [j20]Yanzhi Ren, Jie Yang, Mooi Choo Chuah, Yingying Chen:
Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones. Ad Hoc Sens. Wirel. Networks 27(1-2): 51-73 (2015) - [j19]Yan Wang, Yingying Chen, Jie Yang, Hongbo Liu, Marco Gruteser, Richard P. Martin:
A Low-Cost Wi-Fi-Based Solution for Measuring Human Queues. GetMobile Mob. Comput. Commun. 19(1): 10-13 (2015) - [j18]Xiuyuan Zheng, Jie Yang, Yingying Chen, Hui Xiong:
An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization. IEEE Trans. Mob. Comput. 14(6): 1138-1150 (2015) - [j17]Jiadi Yu, Haofu Han, Hongzi Zhu, Yingying Chen, Jie Yang, Yanmin Zhu, Guangtao Xue, Minglu Li:
Sensing Human-Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones. IEEE Trans. Mob. Comput. 14(8): 1698-1711 (2015) - [j16]Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, Jie Yang:
User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems. IEEE Trans. Mob. Comput. 14(9): 1961-1974 (2015) - [j15]Tao Shu, Yingying Chen, Jie Yang:
Protecting Multi-Lateral Localization Privacy in Pervasive Environments. IEEE/ACM Trans. Netw. 23(5): 1688-1701 (2015) - [c47]Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Critical segment based real-time E-signature for securing mobile transactions. CNS 2015: 7-15 - [c46]Yan Wang, Yingying Chen, Fan Ye, Jie Yang, Hongbo Liu:
Towards Understanding the Advertiser's Perspective of Smartphone User Privacy. ICDCS 2015: 288-297 - [c45]Yanzhi Ren, Chen Wang, Jie Yang, Yingying Chen:
Fine-grained sleep monitoring: Hearing your breathing with smartphones. INFOCOM 2015: 1194-1202 - [c44]Jian Liu, Yan Wang, Gorkem Kar, Yingying Chen, Jie Yang, Marco Gruteser:
Snooping Keystrokes with mm-level Audio Ranging on a Single Phone. MobiCom 2015: 142-154 - [c43]Jian Liu, Yan Wang, Yingying Chen, Jie Yang, Xu Chen, Jerry Cheng:
Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi. MobiHoc 2015: 267-276 - [c42]Luyang Liu, Çagdas Karatas, Hongyu Li, Sheng Tan, Marco Gruteser, Jie Yang, Yingying Chen, Richard P. Martin:
Toward Detection of Unsafe Driving with Wearables. WearSys@MobiSys 2015: 27-32 - [c41]Jiadi Yu, Jiaming Zhao, Yingying Chen, Jie Yang:
Sensing Ambient Light for User Experience-Oriented Color Scheme Adaptation on Smartphone Displays. SenSys 2015: 309-321 - 2014
- [b1]Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng:
Pervasive Wireless Environments: Detecting and Localizing User Spoofing. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-07355-2, pp. 1-72 - [j14]Hongbo Liu, Jie Yang, Simon Sidhom, Yan Wang, Yingying Chen, Fan Ye:
Accurate WiFi Based Localization for Smartphones Using Peer Assistance. IEEE Trans. Mob. Comput. 13(10): 2199-2214 (2014) - [j13]Hongbo Liu, Jie Yang, Yan Wang, Yingying (Jennifer) Chen, Can Emre Koksal:
Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation. IEEE Trans. Mob. Comput. 13(12): 2820-2835 (2014) - [j12]Xiuyuan Zheng, Hongbo Liu, Jie Yang, Yingying Chen, Richard P. Martin, Xiaoyan Li:
A Study of Localization Accuracy Using Multiple Frequencies and Powers. IEEE Trans. Parallel Distributed Syst. 25(8): 1955-1965 (2014) - [c40]Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen:
Practical user authentication leveraging channel state information (CSI). AsiaCCS 2014: 389-400 - [c39]Xiuyuan Zheng, Chen Wang, Yingying Chen, Jie Yang:
Accurate rogue access point localization leveraging fine-grained channel information. CNS 2014: 211-219 - [c38]Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie:
Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing. GLOBECOM 2014: 594-600 - [c37]Haofu Han, Jiadi Yu, Hongzi Zhu, Yingying Chen, Jie Yang, Yanmin Zhu, Guangtao Xue, Minglu Li:
SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environments. INFOCOM 2014: 727-735 - [c36]Tao Shu, Yingying Chen, Jie Yang, Albert Williams:
Multi-lateral privacy-preserving localization in pervasive environments. INFOCOM 2014: 2319-2327 - [c35]Chao Jiang, Muhammad Fahad, Yi Guo, Jie Yang, Yingying Chen:
Robot-assisted human indoor localization using the Kinect sensor and smartphones. IROS 2014: 4083-4089 - [c34]Yanzhi Ren, Chen Wang, Yingying Chen, Jie Yang:
Poster: hearing your breathing: fine-grained sleep monitoring using smartphones. MobiCom 2014: 409-412 - [c33]Yan Wang, Jian Liu, Yingying Chen, Marco Gruteser, Jie Yang, Hongbo Liu:
E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures. MobiCom 2014: 617-628 - [c32]Yan Wang, Jie Yang, Yingying Chen, Hongbo Liu, Marco Gruteser, Richard P. Martin:
Tracking human queues using single-point signal monitoring. MobiSys 2014: 42-54 - 2013
- [j11]Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng:
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks. IEEE Trans. Parallel Distributed Syst. 24(1): 44-58 (2013) - [c31]Hongbo Liu, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Towards self-healing smart grid via intelligent local controller switching under jamming. CNS 2013: 127-135 - [c30]Shan Zhou, Jie Yang, Dahai Xu, Guangzhi Li, Yu Jin, Zihui Ge, Mario Kosseifi, Robert D. Doverspike, Yingying Chen, Lei Ying:
Proactive call drop avoidance in UMTS networks. INFOCOM 2013: 425-429 - [c29]Xiuyuan Zheng, Jie Yang, Yingying Chen, Yu Gan:
Adaptive device-free passive localization coping with dynamic target speed. INFOCOM 2013: 485-489 - [c28]Hongbo Liu, Yang Wang, Jie Yang, Yingying Chen:
Fast and practical secret key extraction by exploiting channel response. INFOCOM 2013: 3048-3056 - [c27]Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, Richard P. Martin:
Measuring human queues using WiFi signals. MobiCom 2013: 235-238 - [c26]Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, Richard P. Martin:
Sensing vehicle dynamics for determining driver phone use. MobiSys 2013: 41-54 - [c25]Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Smartphone based user verification leveraging gait recognition for mobile healthcare systems. SECON 2013: 149-157 - [c24]Haofu Han, Jiadi Yu, Hongzi Zhu, Yingying Chen, Jie Yang, Guangtao Xue, Yanmin Zhu, Minglu Li:
E3: energy-efficient engine for frame rate adaptation on smartphones. SenSys 2013: 15:1-15:14 - 2012
- [j10]Jie Yang, Yingying Chen:
Toward attack-resistant localization under infrastructure attacks. Secur. Commun. Networks 5(4): 384-403 (2012) - [j9]Jie Yang, Simon Sidhom, Gayathri Chandrasekaran, Tam Vu, Hongbo Liu, Nicolae Cecan, Yingying Chen, Marco Gruteser, Richard P. Martin:
Sensing Driver Phone Use with Acoustic Ranging through Car Speakers. IEEE Trans. Mob. Comput. 11(9): 1426-1440 (2012) - [j8]Xiaoyan Li, Yingying Chen, Jie Yang, Xiuyuan Zheng:
Achieving robust wireless localization resilient to signal strength attacks. Wirel. Networks 18(1): 45-58 (2012) - [c23]Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen:
Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks. INFOCOM 2012: 927-935 - [c22]Hongbo Liu, Yu Gan, Jie Yang, Simon Sidhom, Yan Wang, Yingying Chen, Fan Ye:
Push the limit of WiFi based localization for smartphones. MobiCom 2012: 305-316 - [c21]Jie Yang, Yingying Chen, Sanjay Macwan, Cristina Serban, Shu Chen, Wade Trappe:
Securing Mobile Location-based Services through position verification leveraging key distribution. WCNC 2012: 2694-2699 - 2011
- [j7]Jie Yang, Yingying Chen, Jerry Cheng:
Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments. Ad Hoc Sens. Wirel. Networks 11(3-4): 307-329 (2011) - [c20]Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen:
Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching. GLOBECOM 2011: 1-6 - [c19]Xiaoyan Li, Yingying Chen, Jie Yang, Xiuyuan Zheng:
Designing localization algorithms robust to signal strength attacks. INFOCOM 2011: 341-345 - [c18]Yanzhi Ren, Jie Yang, Mooi Choo Chuah, Yingying Chen:
Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare. MASS 2011: 646-651 - [c17]Jie Yang, Simon Sidhom, Gayathri Chandrasekaran, Tam Vu, Hongbo Liu, Nicolae Cecan, Yingying Chen, Marco Gruteser, Richard P. Martin:
Detecting driver phone use leveraging car speakers. MobiCom 2011: 97-108 - [c16]Gayathri Chandrasekaran, Tam Vu, Alexander Varshavsky, Marco Gruteser, Richard P. Martin, Jie Yang, Yingying Chen:
Tracking vehicular speed variations by warping mobile phone signal strengths. PerCom 2011: 213-221 - 2010
- [j6]Yingying Chen, Wendy Hui Wang, Xiuyuan Zheng, Jie Yang:
A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j5]Jie Yang, Yanzhi Ren, Yingying Chen, Mooi Choo Chuah:
A social community based approach for reducing the propagation of infectious diseases in healthcare. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(3): 7-9 (2010) - [j4]Konstantinos Kleisouris, Yingying Chen, Jie Yang, Richard P. Martin:
Empirical Evaluation of Wireless Localization when Using Multiple Antennas. IEEE Trans. Parallel Distributed Syst. 21(11): 1595-1610 (2010) - [j3]Yingying Chen, Jie Yang, Wade Trappe, Richard P. Martin:
Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks. IEEE Trans. Veh. Technol. 59(5): 2418-2434 (2010) - [j2]Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen:
Detecting wormhole attacks in delay-tolerant networks. IEEE Wirel. Commun. 17(5): 36-42 (2010) - [c15]Jie Yang, Alexander Varshavsky, Hongbo Liu, Yingying Chen, Marco Gruteser:
Accuracy characterization of cell tower localization. UbiComp 2010: 223-226 - [c14]Gayathri Chandrasekaran, Tam Vu, Alexander Varshavsky, Marco Gruteser, Richard P. Martin, Jie Yang, Yingying Chen:
Vehicular speed estimation using received signal strength from mobile phones. UbiComp 2010: 237-240 - [c13]Jie Yang, Yong Ge, Hui Xiong, Yingying Chen, Hongbo Liu:
Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments. INFOCOM 2010: 767-775 - [c12]Xiuyuan Zheng, Hongbo Liu, Jie Yang, Yingying Chen, John-Austen Francisco, Richard P. Martin, Xiaoyan Li:
Characterizing the impact of multi-frequency and multi-power on localization accuracy. MASS 2010: 156-165 - [c11]Jie Yang, Jerry Cheng, Yingying Chen:
Mobile Sensing Enabled Robust Detection of Security Threats in Urban Environments. QSHINE 2010: 88-104 - [c10]Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen:
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks. WCNC 2010: 1-6 - [c9]Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen:
Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording. WOWMOM 2010: 1-6
2000 – 2009
- 2009
- [j1]Gayathri Chandrasekaran, Mesut Ali Ergin, Marco Gruteser, Richard P. Martin, Jie Yang, Yingying Chen:
DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices. IEEE Trans. Mob. Comput. 8(12): 1663-1675 (2009) - [c8]Jie Yang, Yingying Chen:
Indoor Localization Using Improved RSS-Based Lateration Methods. GLOBECOM 2009: 1-6 - [c7]Jie Yang, Yingying Chen, Wade Trappe, Jay Cheng:
Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks. INFOCOM 2009: 666-674 - [c6]Gayathri Chandrasekaran, Mesut Ali Ergin, Jie Yang, Song Liu, Yingying Chen, Marco Gruteser, Richard P. Martin:
Empirical Evaluation of the Limits on Localization Using Signal Strength. SECON 2009: 1-9 - [c5]Jie Yang, Yingying Chen, Wade Trappe:
Detecting Spoofing Attacks in Mobile Wireless Environments. SECON 2009: 1-9 - 2008
- [c4]Jie Yang, Yingying Chen:
A theoretical analysis of wireless localization using RF-based fingerprint matching. IPDPS 2008: 1-6 - [c3]Gayathri Chandrasekaran, Mesut Ali Ergin, Marco Gruteser, Richard P. Martin, Jie Yang, Yingying Chen:
DECODE : Detecting co-moving wireless devices. MASS 2008: 315-320 - [c2]Jie Yang, Yingying Chen, Wade Trappe:
Detecting sybil attacks inwireless and sensor networks using cluster analysis. MASS 2008: 834-839 - [c1]Konstantinos Kleisouris, Yingying Chen, Jie Yang, Richard P. Martin:
The Impact of Using Multiple Antennas on Wireless Localization. SECON 2008: 55-63
Coauthor Index
aka: Yingying (Jennifer) Chen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint