• Publications
  • Influence
E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures
TLDR
This paper presents device-free location-oriented activity identification at home through the use of existing WiFi access points and WiFi devices (e.g., desktops, thermostats, refrigerators, smartTVs, laptops). Expand
  • 508
  • 66
  • PDF
Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi
TLDR
We propose to track the vital signs of both breathing rate and heart rate during sleep by using off-the-shelf WiFi without any wearable or dedicated devices. Expand
  • 224
  • 30
  • PDF
Fast and practical secret key extraction by exploiting channel response
TLDR
We show that exploiting the channel response from multiple Orthogonal Frequency-Division Multiplexing (OFDM) subcarriers can provide fine-grained channel information and achieve higher bit generation rate for both static and mobile cases in real-world scenarios. Expand
  • 143
  • 27
  • PDF
Push the limit of WiFi based localization for smartphones
TLDR
We propose a peer assisted localization approach to eliminate large errors in WiFi-based indoor localization of smartphones. Expand
  • 364
  • 25
  • PDF
Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks
TLDR
We propose a method for detecting identity-based attacks, including spoofing and Sybil attacks, and localizing the adversaries in wireless and sensor networks. Expand
  • 182
  • 16
  • PDF
Detecting and Localizing Wireless Spoofing Attacks
TLDR
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Expand
  • 248
  • 15
  • PDF
Indoor Localization Using Improved RSS-Based Lateration Methods
  • J. Yang, Y. Chen
  • Computer Science
  • GLOBECOM - IEEE Global Telecommunications…
  • 30 November 2009
TLDR
We propose two methods to improve the localization accuracy of RSS-based lateration methods by exploiting the correlation among RSS in local area to obtain more accurate signal propagation. Expand
  • 156
  • 14
  • PDF
Snooping Keystrokes with mm-level Audio Ranging on a Single Phone
TLDR
This paper explores the limits of audio ranging on mobile devices in the context of a keystroke snooping scenario. Expand
  • 90
  • 12
  • PDF
Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks
TLDR
We propose a framework for collaborative key generation among a group of wireless devices leveraging RSS. Expand
  • 99
  • 11
  • PDF
Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT
TLDR
This paper supports the extended concept of user authentication with a device-free approach by leveraging the prevalent WiFi signals made available by IoT devices, such as smart refrigerator, smart TV and thermostat, to capture unique human physiological and behavioral characteristics inherited from their daily activities. Expand
  • 83
  • 11
  • PDF