default search action
Yanzhi Ren
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Yuchen Su, Shiyue Huang, Hongbo Liu, Yuefeng Chen, Yicong Du, Yan Wang, Yanzhi Ren, Yingying Chen:
PPG-Hear: A Practical Eavesdropping Attack with Photoplethysmography Sensors. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(2): 82:1-82:28 (2024) - [j14]Yanzhi Ren, Chen Chen, Hongbo Liu, Jiadi Yu, Zhourong Zheng, Yingying Chen, Pengcheng Huang, Hongwei Li:
Secure Mobile Two-Factor Authentication Leveraging Active Sound Sensing. IEEE Trans. Mob. Comput. 23(2): 1262-1277 (2024) - [j13]Yanzhi Ren, Siyi Li, Chen Chen, Hongbo Liu, Jiadi Yu, Yingying Chen, Haomiao Yang, Hongwei Li:
Robust Indoor Location Identification for Smartphones Using Echoes From Dominant Reflectors. IEEE Trans. Mob. Comput. 23(5): 5310-5326 (2024) - [j12]Yicong Du, Huan Dai, Hongbo Liu, Yan Wang, Guyue Li, Yanzhi Ren, Yingying Chen, Ke Zhang:
Secret Key Generation Based on Manipulated Channel Measurement Matching. IEEE Trans. Mob. Comput. 23(10): 9532-9548 (2024) - [j11]Zhiliang Xia, Yanzhi Ren, Siyi Li, Jiachen Ou, Hongbo Liu, Yingying Chen, Shu Fu, Hongwei Li:
Indoor Location Identification for Smart Speakers Leveraging 3-D Acoustic Images. IEEE Trans. Mob. Comput. 23(12): 10720-10733 (2024) - [j10]Yanzhi Ren, Tingyuan Yang, Zhiliang Xia, Hongbo Liu, Jiadi Yu, Bo Liu, Hongwei Li:
Robust Mobile Two-Factor Authentication Leveraging Acoustic Fingerprinting. IEEE Trans. Mob. Comput. 23(12): 11105-11120 (2024) - [j9]Yicong Du, Hongbo Liu, Ziyu Shao, Yanzhi Ren, Shuai Li, Huan Dai, Jiadi Yu:
Secure and Controllable Secret Key Generation Through CSI Obfuscation Matrix Encapsulation. IEEE Trans. Mob. Comput. 23(12): 12313-12329 (2024) - [c31]Yicong Du, Limin Liu, Hongbo Liu, Yanzhi Ren, Bo Liu:
Secret Key Generation with Adaptive Pilot Manipulation for Matching-Based Method. ICC 2024: 2688-2693 - [c30]Hao Kong, Haoxin Lyu, Jiadi Yu, Linghe Kong, Junlin Yang, Yanzhi Ren, Hongbo Liu, Yingying Chen:
mmHand: 3D Hand Pose Estimation Leveraging mmWave Signals. ICDCS 2024: 1062-1073 - [c29]Limin Liu, Hongbo Liu, Yicong Du, Ziyu Shao, Haomiao Yang, Yanzhi Ren:
Physical Layer Secret Key Generation Leveraging Proactive Pilot Contamination. ICDCS 2024: 1272-1282 - [c28]Yilin Yang, Yan Wang, Yingying Chen, Zhengkun Ye, Xin Li, Zhiliang Xia, Yanzhi Ren:
TouchTone: Smartwatch Privacy Protection via Unobtrusive Finger Touch Gestures. MobiSys 2024: 141-154 - 2023
- [j8]Yanzhi Ren, Zhourong Zheng, Sibo Xu, Hongwei Li:
User Identification Leveraging Whispered Sound for Wearable Devices. IEEE Trans. Mob. Comput. 22(3): 1841-1855 (2023) - [c27]Yanzhi Ren, Zhiliang Xia, Siyi Li, Hongbo Liu, Yingying Chen, Shuai Li, Hongwei Li:
EchoImage: User Authentication on Smart Speakers Using Acoustic Signals. ICDCS 2023: 236-247 - [c26]Yuchen Su, Guoqing Jiang, Yicong Du, Yuefeng Chen, Hongbo Liu, Yanzhi Ren, Huan Dai, Yan Wang, Shuai Li, Yingying Chen:
P2Auth: Two-Factor Authentication Leveraging PIN and Keystroke-Induced PPG Measurements. ICDCS 2023: 726-737 - [c25]Yanzhi Ren, Tingyuan Yang, Zhiliang Xia, Hongbo Liu, Yingying Chen, Nan Jiang, Zhaohui Yuan, Hongwei Li:
Secure and Robust Two Factor Authentication via Acoustic Fingerprinting. INFOCOM 2023: 1-10 - [c24]Jie Wen, Nan Jiang, Jin Li, Ximeng Liu, Honglong Chen, Yanzhi Ren, Zhaohui Yuan, Ziang Tu:
DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks. INFOCOM 2023: 1-10 - 2022
- [j7]Chen Chen, Yanzhi Ren, Hongbo Liu, Yingying Chen, Hongwei Li:
Acoustic-Sensing-Based Location Semantics Identification Using Smartphones. IEEE Internet Things J. 9(20): 20640-20650 (2022) - [c23]Xiangyu Xu, Jiadi Yu, Chengguang Ma, Yanzhi Ren, Hongbo Liu, Yanmin Zhu, Yingying Chen, Feilong Tang:
mmECG: Monitoring Human Cardiac Cycle in Driving Environments Leveraging Millimeter Wave. INFOCOM 2022: 90-99 - [c22]Yuefeng Chen, Yicong Du, Chunlong Xu, Yanghai Yu, Hongbo Liu, Huan Dai, Yanzhi Ren, Jiadi Yu:
ArmSpy: Video-assisted PIN Inference Leveraging Keystroke-induced Arm Posture Changes. INFOCOM 2022: 1878-1887 - 2021
- [c21]Yanzhi Ren, Zhourong Zheng, Hongbo Liu, Yingying Chen, Hongwei Li, Chen Wang:
Breathing Sound-based Exercise Intensity Monitoring via Smartphones. ICCCN 2021: 1-10 - [c20]Hongbo Liu, Yan Wang, Yanzhi Ren, Yingying Chen:
Bipartite Graph Matching Based Secret Key Generation. INFOCOM 2021: 1-10 - [c19]Yanzhi Ren, Ping Wen, Hongbo Liu, Zhourong Zheng, Yingying Chen, Pengcheng Huang, Hongwei Li:
Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing. INFOCOM 2021: 1-10 - 2020
- [j6]Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Signature Verification Using Critical Segments for Securing Mobile Transactions. IEEE Trans. Mob. Comput. 19(3): 724-739 (2020) - [c18]Zhenzhe Lin, Yucheng Xie, Xiaonan Guo, Yanzhi Ren, Yingying Chen, Chen Wang:
WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi Signals. ICCCN 2020: 1-9 - [i1]Chen Wang, Zhenzhe Lin, Yucheng Xie, Xiaonan Guo, Yanzhi Ren, Yingying Chen:
WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi Signals. CoRR abs/2003.09096 (2020)
2010 – 2019
- 2019
- [j5]Yanzhi Ren, Chen Wang, Yingying Chen, Jie Yang, Hongwei Li:
Noninvasive Fine-Grained Sleep Monitoring Leveraging Smartphones. IEEE Internet Things J. 6(5): 8248-8261 (2019) - [c17]Zhenzhe Lin, Yucheng Xie, Xiaonan Guo, Chen Wang, Yanzhi Ren, Yingying Chen:
Wi-Fi-Enabled Automatic Eating Moment Monitoring Using Smartphones. HealthyIoT 2019: 77-91 - [c16]Wenbo Jiang, Hongwei Li, Sen Liu, Yanzhi Ren, Miao He:
A Flexible Poisoning Attack Against Machine Learning. ICC 2019: 1-6 - 2018
- [c15]Guowen Xu, Hongwei Li, Wenlei Wang, Yue Chen, Haomiao Yang, Yanzhi Ren:
Towards practical personalized recommendation with multi-level differential privacy controls. INFOCOM Workshops 2018: 796-801 - 2017
- [c14]Yanzhi Ren, Sanyang Liu:
Modified Particle Swarm Optimization Algorithm for Engineering Structural Optimization Problem. CIS 2017: 504-507 - 2015
- [j4]Yanzhi Ren, Jie Yang, Mooi Choo Chuah, Yingying Chen:
Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones. Ad Hoc Sens. Wirel. Networks 27(1-2): 51-73 (2015) - [j3]Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, Jie Yang:
User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems. IEEE Trans. Mob. Comput. 14(9): 1961-1974 (2015) - [c13]Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Critical segment based real-time E-signature for securing mobile transactions. CNS 2015: 7-15 - [c12]Yanzhi Ren, Chen Wang, Jie Yang, Yingying Chen:
Fine-grained sleep monitoring: Hearing your breathing with smartphones. INFOCOM 2015: 1194-1202 - [c11]Shubham Jain, Carlo Borgiattino, Yanzhi Ren, Marco Gruteser, Yingying Chen, Carla-Fabiana Chiasserini:
LookUp: Enabling Pedestrian Safety Services via Shoe Sensing. MobiSys 2015: 257-271 - [c10]Shubham Jain, Carlo Borgiattino, Yanzhi Ren, Marco Gruteser, Yingying Chen, Carla-Fabiana Chiasserini:
Video: LookUp!: Enabling Pedestrian Safety Services via Shoe Sensing. MobiSys 2015: 435 - 2014
- [c9]Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie:
Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing. GLOBECOM 2014: 594-600 - [c8]Yanzhi Ren, Chen Wang, Yingying Chen, Jie Yang:
Poster: hearing your breathing: fine-grained sleep monitoring using smartphones. MobiCom 2014: 409-412 - [c7]Shubham Jain, Carlo Borgiattino, Yanzhi Ren, Marco Gruteser, Yingying Chen:
On the limits of positioning-based pedestrian risk awareness. MARS@MobiSys 2014: 23-28 - 2013
- [c6]Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Smartphone based user verification leveraging gait recognition for mobile healthcare systems. SECON 2013: 149-157 - 2012
- [c5]Yanzhi Ren, Yingying Chen, Mooi Choo Chuah:
Social closeness based clone attack detection for mobile healthcare system. MASS 2012: 191-199 - 2011
- [c4]Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen:
Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching. GLOBECOM 2011: 1-6 - [c3]Yanzhi Ren, Jie Yang, Mooi Choo Chuah, Yingying Chen:
Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare. MASS 2011: 646-651 - 2010
- [j2]Jie Yang, Yanzhi Ren, Yingying Chen, Mooi Choo Chuah:
A social community based approach for reducing the propagation of infectious diseases in healthcare. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(3): 7-9 (2010) - [j1]Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen:
Detecting wormhole attacks in delay-tolerant networks. IEEE Wirel. Commun. 17(5): 36-42 (2010) - [c2]Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen:
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks. WCNC 2010: 1-6 - [c1]Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen:
Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording. WOWMOM 2010: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint