Learn More
Securing the sensitive data stored and accessed from mobile devices makes user authentication a problem of paramount importance. The tension between security and usability renders however the task of user authentication on mobile devices a challenging task. This paper introduces FAST (Fingergestures Authentication System using Touchscreen), a novel(More)
People spend approximately 70% of their time indoors. Understanding the indoor environments is therefore important for a wide range of emerging mobile personal and social applications. Knowledge of indoor floorplans is often required by these applications. However, indoor floorplans are either unavailable or obtaining them requires slow, tedious, and(More)
People spend the majority of their time indoors, and human indoor activities are strongly correlated with the rooms they are in. Room localization, which identifies the room a person or mobile phone is in, provides a powerful tool for characterizing human indoor activities and helping address challenges in public health, productivity, building management,(More)
Most people spend more than 90% of their time indoors; indoor air quality (IAQ) influences human health, safety, productivity, and comfort. This paper describes MAQS, a personalized mobile sensing system for IAQ monitoring. In contrast with existing stationary or outdoor air quality sensing systems, MAQS users carry portable, indoor location tracking(More)
Trip detection is a fundamental issue in many context-sensitive information services on mobile devices. It aims to automatically recognize significant places and trips between them. The key challenge is how to minimize energy consumption while maintaining high accuracy. Previous works that use GPS/WiFi sampling are accurate but energy efficiency is low and(More)
User identification and access control have become a high demand feature on mobile devices because those devices are wildly used by employees in corporations and government agencies for business and store increasing amount of sensitive data. This paper describes SenGuard, a user identification framework that enables continuous and implicit user(More)
This paper proposes to exploit correlation between a user's location and power consumption pattern of his/her smartphone to detect the presence of malicious code in the smartphone. Based on the observation that user location plays an important role in phone usage, the hypothesis is that there is a strong correlation between smartphone power consumption(More)
Emerging electric-drive vehicles demonstrate the potential for significant reduction of petroleum consumption and greenhouse gas emissions. Existing electric-drive vehicles typi- cally include a battery system consisting of thousands of Lithium-ion battery cells. Therefore, large-scale battery-system modeling and analysis is essential for battery system(More)