Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
REHSense: Towards Battery-Free Wireless Sensing via Radio Frequency Energy Harvesting
MobiHoc '24: Proceedings of the Twenty-fifth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile ComputingPages 211–220https://doi.org/10.1145/3641512.3686388Diverse Wi-Fi-based wireless applications have been proposed, ranging from daily activity recognition to vital sign monitoring. Despite their remarkable sensing accuracy, the high energy consumption and the requirement for customized hardware ...
- research-articleJune 2024
F2Key: Dynamically Converting Your Face into a Private Key Based on COTS Headphones for Reliable Voice Interaction
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 127–140https://doi.org/10.1145/3643832.3661860In this paper, we proposed F2Key, the first earable physical security system based on commercial off-the-shelf headphones. F2Key enables impactful applications, such as enhancing voiceprint-based authentication systems, reliable voice assistants, audio ...
- short-paperJune 2024
Sensor Security in Virtual Reality: Exploration and Mitigation
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 758–759https://doi.org/10.1145/3643832.3661389Virtual Reality (VR) technology, extensively utilized in gaming, social networking, and online collaboration, has raised significant security concerns due to the array of sensors integrated into VR headsets. This paper discusses several of our ongoing ...
- research-articleMay 2024
RF-Egg: An RF Solution for Fine-Grained Multi-Target and Multi-Task Egg Incubation Sensing
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 528–542https://doi.org/10.1145/3636534.3649378Eggs and chickens serve as crucial animal-source proteins in our diets, making large-scale breeding egg incubation an essential undertaking. However, current solutions, i.e., vision-based and sensor-based methods, are primarily designed for egg fertility ...
- research-articleMay 2024
mmSign: mmWave-based Few-Shot Online Handwritten Signature Verification
ACM Transactions on Sensor Networks (TOSN), Volume 20, Issue 4Article No.: 89, Pages 1–31https://doi.org/10.1145/3605945Handwritten signature verification has become one of the most important document authentication methods that are widely used in the financial, legal, and administrative sectors. Compared with offline methods based on static signature images, online ...
-
- research-articleFebruary 2024
FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa Networks
ACM Transactions on Sensor Networks (TOSN), Volume 20, Issue 3Article No.: 54, Pages 1–28https://doi.org/10.1145/3641548The widespread deployment of unattended LoRa networks poses a growing need to perform Firmware Updates Over-The-Air (FUOTA). However, the FUOTA specifications dedicated by LoRa Alliance fall short of several deficiencies with respect to energy efficiency, ...
- research-articleNovember 2023
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 253–267https://doi.org/10.1145/3576915.3623153Recently, in-display fingerprint sensors have been widely adopted in newly-released smartphones. However, we find this new technique can leak information about the user's fingerprints during a screen-unlocking process via the electromagnetic (EM) side ...
- research-articleOctober 2023
XPorter: A Study of the Multi-Port Charger Security on Privacy Leakage and Voice Injection
ACM MobiCom '23: Proceedings of the 29th Annual International Conference on Mobile Computing and NetworkingArticle No.: 78, Pages 1–15https://doi.org/10.1145/3570361.3613293Multi-port chargers, capable of simultaneously charging multiple mobile devices such as smartphones, have gained immense popularity and sold millions of units in recent years. However, this charging-targeted feature can also pose security and privacy ...
- research-articleOctober 2023
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning
ACM MobiCom '23: Proceedings of the 29th Annual International Conference on Mobile Computing and NetworkingArticle No.: 73, Pages 1–15https://doi.org/10.1145/3570361.3613288Recently, power banks for smartphones have begun to support wireless charging. Although these wireless charging power banks appear to be immune to most reported vulnerabilities in either power banks or wireless charging, we have found a new contactless ...
- research-articleAugust 2023
Eavesdropping mobile app activity via radio-frequency energy harvesting
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 197, Pages 3511–3528Radio-frequency (RF) energy harvesting is a promising technology for Internet-of-Things (IoT) devices to power sensors and prolong battery life. In this paper, we present a novel side-channel attack that leverages RF energy harvesting signals to ...
- demonstrationMay 2023
Demo Abstract: A Novel Firmware Update Over-The-Air System for LoRa Networks
IPSN '23: Proceedings of the 22nd International Conference on Information Processing in Sensor NetworksPages 362–363https://doi.org/10.1145/3583120.3589816LoRa has emerged as a novel Internet of Things (IoT) communication paradigm, featuring with long-range and low-power transmission capabilities. With the widespread deployment of LoRa networks, the demand to perform Firmware Update Over-The-Air (FUOTA) ...
- research-articleMay 2023
FLoRa: Energy-Efficient, Reliable, and Beamforming-Assisted Over-The-Air Firmware Update in LoRa Networks
IPSN '23: Proceedings of the 22nd International Conference on Information Processing in Sensor NetworksPages 14–26https://doi.org/10.1145/3583120.3586963LoRa has emerged as one of the promising long-range and low-power wireless communication technologies for Internet of Things (IoT). With the massive deployment of LoRa networks, the ability to perform Firmware Update Over-The-Air (FUOTA) is becoming a ...
- research-articleApril 2023
Numerical simulation of interfacial and subinterfacial crack propagation by using extended peridynamics
Highlights- An extended bond-based peridynamic (PD) model is used to investigate interfacial and subinterfacial fracture behaviors in bimaterial structures.
The interaction between crack propagation and interfaces is one of the critical problems in bimaterial systems. In this paper, interfacial and subinterfacial fracture behaviors are simulated to investigate this interaction. The ...
- research-articleApril 2023
MobileKey: A Fast and Robust Key Generation System for Mobile Devices
UbiComp/ISWC '22 Adjunct: Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable ComputersPages 427–431https://doi.org/10.1145/3544793.3560413Wireless key generation is promising in establishing a pair of secret keys for ubiquitous Wi-Fi networks. However, existing Wi-Fi-based key generation systems are not always applicable in dynamic mobile wireless environments because they are completed ...
- research-articleSeptember 2022
SwipePass: Acoustic-based Second-factor User Authentication for Smartphones
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 3Article No.: 106, Pages 1–25https://doi.org/10.1145/3550292Pattern lock-based authentication has been widely adopted in modern smartphones. However, this scheme relies essentially on passwords, making it vulnerable to various side-channel attacks such as the smudge attack and the shoulder-surfing attack. In this ...
- research-articleSeptember 2021
A Simple and Fast Human Activity Recognition System Using Radio Frequency Energy Harvesting
UbiComp/ISWC '21 Adjunct: Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2021 ACM International Symposium on Wearable ComputersPages 666–671https://doi.org/10.1145/3460418.3480399Recognizing indoor activities of an individual provides useful information in smart living, well-being monitoring, and fitness management. In this paper, we propose a simple and fast human activity recognition (HAR) system based on Radio Frequency ...
- research-articleFebruary 2021
Simultaneous identification of points and circles: structure from motion system in industry scenes
Pattern Analysis & Applications (PAAS), Volume 24, Issue 1Pages 333–342https://doi.org/10.1007/s10044-020-00889-2AbstractTo address the issue of dynamic 3D circular features recognition in robot arm grasping, we propose a feature-based and incremental simultaneous points and circles structure from motion system. First, we represent the 3D target scene with sparse ...
- research-articleJanuary 2021
Secrecy-Oriented Optimization of Sparse Code Multiple Access for Simultaneous Wireless Information and Power Transfer in 6G Aerial Access Networks
This article focuses on the simultaneous wireless information and power transfer (SWIPT) systems, which provide both the power supply and the communications for Internet-of-Things (IoT) devices in the sixth-generation (6G) network. Due to the extremely ...
- research-articleJanuary 2020
Dynamic response and control accuracy optimization of marine hydraulic manipulator based on piecewise P and fuzzy PI control algorithms
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 38, Issue 1Pages 75–88https://doi.org/10.3233/JIFS-179382Marine hydraulic manipulator is limited by its size, weight and environment, so traditional hydraulic manipulator cannot be used for marine equipment. In this paper, large displacement pump is replaced by small displacement pump, accumulator is used as ...
- research-articleAugust 2016
Application of isomorphic haptic device in excavator simulation
2016 IEEE International Conference on Mechatronics and AutomationPages 2166–2172https://doi.org/10.1109/ICMA.2016.7558902This paper presents an application of an isomorphic haptic device in excavator simulation. First, we introduce system composition and techniques used in mapping position and forces. Then, the position prediction model of haptic device and the dynamic ...