Publications

 

Go back to Yingying's Home


Books

Yingying Chen, Wenyuan Xu, Wade Trappe, Yanyong Zhang, Securing Emerging Wireless Systems,
ISBN:978-0-387-88490-5,Springer, 2009.
   
Jie Yang, Yingying Chen, Wade Trappe, and Jerry Cheng, Pervasive Wireless Environments: Detecting and Localizing User Spoofing,
ISBN: 978-3-319-07355-2,Springer, 2014.

Book Chapters

  1. Yingying Chen and Jie Yang, "Defending against Identity-Based Attacks in Wireless Networks", Securing Cyber-Physical Infrastructures: Foundations and Challenges, Sajal Das, Krishna Kant and Nan Zhang (eds.), Morgan Kaufmann, 2012.

  2. Jie Yang, Yingying Chen, Richard P. Martin, Wade Trappe and Marco Gruteser, "On the Performance of Wireless Indoor Localization Using Received Signal Strength", Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE, chapter 12, 2011.

  3. Yingying Chen, Jie Yang, Wade Trappe and Richard P. Martin, "Impact of Anchor Placement and Anchor Selection on Localization Accuracy", Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE, chapter 13, 2011.

Journal Papers

  1. Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen, H. Vincent Poor,

  2. Authenticating Users through Fine-grained Channel Information,

    IEEE Transactions on Mobile Computing (IEEE TMC), 2017. (To appear)

  3. Chen Wang, Xiuyuan Zheng, Yingying Chen, Jie Yang,

  4. Locating Rogue Access Point using Fine-grained Channel Information,

    IEEE Transactions on Mobile Computing (IEEE TMC), 2017. (To appear)

  5. Hongbo Liu, Yingying Chen, Mooi Choo Chuah, Jie Yang, H. Vincent Poor,

  6. Enabling Self-healing Smart Grid Through Jamming Resilient Local Controller Switching, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Volume 14, Issue 4, Pages 377-391, 2017.

  7. Jiadi Yu, Zhongyang Chen, Yanmin Zhu, Yingying Chen, Linghe Kong, Minglu Li,

  8. Fine-grained Abnormal Driving Behaviors Detection and Identification with Smartphones, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 8, Pages 2198-2212, 2017.

  9. Yan Wang, Yingying Chen, Jie Yang, Luyang Liu, Marco Gruteser, Richard P. Martin, Hongbo Liu,

  10. Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 8, Pages 1965-1981, 2016.

  11. Wen Ji, Yingying Chen, Bo-Wei Chen, Yiqiang Chen, Sun-Yuan Kung,

  12. Profit Maximization through Online Advertising Scheduling for a Wireless Video Broadcast Network, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 8, Pages 2064-2079, 2016.

  13. Jiadi Yu, Haofu Han, Hongzi Zhu, Yingying Chen, Jie Yang, Yanmin Zhu, Guangtao Xue and Minglu Li,

  14. SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 1, Pages 202-216, 2016.

  15. Tao Shu, Yingying Chen, Jie Yang,

  16. Protecting Multi-Lateral Localization Privacy in Pervasive Environments, [pdf], [BibTex], [Google Scholar]

    IEEE/ACM Transactions on Networking (IEEE/ACM ToN), Volume 23, Issue 5, Pages 1688-1701, 2015.

  17. Xin Dong, Jiadi Yu, Yanmin Zhu, Yingying Chen, Yuan Luo, and Minglu Li,

  18. SECO: Secure and Scalable Data Collaboration Services in Cloud Computing, [pdf], [BibTex], [Google Scholar]

    Computers & Security, Volume 50, Issue 9, Pages 91-105, 2015.

  19. Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, and Jie Yang,

  20. User Verification Leveraging Gait Recognition For Smartphone Enabled Mobile Healthcare Systems, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 14, Issue 9, Pages 1961-1974, 2015.

  21. Xiuyuan Zheng, Jie Yang, Yingying Chen, and Hui Xiong,

  22. An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 14, Issue 6, Pages 1138-1150, 2015.

  23. Jiadi Yu, Haofu Han, Hongzi Zhu, Yingying Chen, Jie Yang, Yanmin Zhu, Guangtao Xue, and Minglu Li,

  24. Sensing Human-Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 14, Issue 8, Pages 1698-1711, 2015.

  25. Yanzhi Ren, Jie Yang, Mooi Choo Chuah, and Yingying Chen,

  26. Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones, [pdf], [BibTex], [Google Scholar]

    Ad Hoc & Sensor Wireless Networks (AHSWN), Volume 27, No. 1-2, Pages 51-73, 2015.

  27. Wenlin Zhang, Yi Guo, Hongbo Liu, Yingying Chen, Zheng Wang, and Joseph Mitola III,

  28. Distributed Consensus-based Weight Design for Cooperative Spectrum Sensing, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 26, Issue 1, Pages 54-64, 2014.

  29. Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, and C. Emre Koksal,

  30. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 13, Issue 12, Pages 2820-2835, 2014.

  31. Hongbo Liu, Jie Yang, Simon Sidhom, Yan Wang, Yingying Chen, Fan Ye,

  32. Accurate WiFi Based Localization for Smartphones Using Peer Assistance, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), 2014, Volume 13, No.10, Pages 2199 - 2214, 2014.

  33. Xiuyuan Zheng, Hongbo Liu, Jie Yang, Yingying Chen, Richard P. Martin, and Xiaoyan Li, [pdf], [BibTex], [Google Scholar]

  34. A Study of Localization Accuracy using Multiple Frequencies and Powers,

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 25, Issue 8, Pages 1955-1965, 2014.

  35. Hongbo Liu, Hui Wang, and Yingying Chen,

  36. Defending against Frequency-based Attacks on Distributed Data Storage in Wireless Networks, [pdf], [BibTex], [Google Scholar]

    ACM Transactions on Sensor Networks (ACM TOSN), Volume 10, Issue 3, Pages 49:1-49:37 2014.

  37. Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, Minglu Li,

  38. Achieving an Effective, Scalable and Privacy-preserving Data Sharing Service in Cloud Computing, [pdf], [BibTex], [Google Scholar]

    Computers & Security, Volume 42, Pages 151-164, 2014.

  39. Yan Wang, Mooi Choo Chuah and Yingying Chen,

  40. Incentive Based Data Sharing in Delay Tolerant Mobile Networks, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Wireless Communications (IEEE TWC), Volume.3, No.1, Pages.370-381, 2014.

  41. Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen,

  42. An Error Minimizing Framework for Localizing Jammers in Wireless Networks, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume.25, No.2, Pages.508-517, 2014.

  43. Jie Yang, Yingying Chen, Wade Trappe, and Jerry Cheng,

  44. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 24, No.1, Pages 44-58, 2013.

  45. Guoru Ding, Jinlong Wang, Qihui Wu, Fei Song,and Yingying Chen,

  46. Spectrum Sensing in Opportunity-Heterogeneous Cognitive Sensor Networks: How to Cooperate?, [pdf], [BibTex], [Google Scholar]

    IEEE Sensors Journal, Volume 13, No. 11, Pages. 4247-4255, November. 2013.

  47. Xiuyuan Zheng, Yingying Chen, Hui Wang, Hongbo Liu, Ruilin Liu,

  48. Neighborhood Prediction Based Decentralized Key Management for Mobile Wireless Networks, [pdf], [BibTex], [Google Scholar]

    Springer Wireless Networks (WiNET), the Journal of Mobile Communication, Computation and Information, Volume 19, Issue 6, pp 1387-1406, August 2013.

  49. Jie Yang, Simon Sidhom, Gayathri Chandrasekaran, Tam Vu, Hongbo Liu, Nicolae Cecan, Yingying Chen, Marco Gruteser, Richard P. Martin,

  50. Sensing Driver Phone Use with Acoustic Ranging Through Car Speakers, Editorial Notes, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume11, No.9, Pages 1426-1440, 2012.

  51. Xiaoyan Li, Yingying Chen, Jie Yang, and Xiuyuan Zheng,

  52. Achieving Robust Wireless Localization Resilient to Signal Strength Attacks, [pdf], [BibTex], [Google Scholar]

    Springer Wireless Networks (WiNET), the Journal of Mobile Communication, Computation and Information, Volume 18, Issue 1, Pages 45-58, 2012.

  53. Jie Yang and Yingying Chen,

  54. Towards Attack Resistant Localization under Infrastructure Attacks, [pdf], [BibTex], [Google Scholar]

    Security and Communication Networks (SCN), Wiley, Volume 5, Issue 4, Pages 384-403, 2012.

  55. Ruilin Liu, Xiuyuan Zheng, Hongbo Liu, Hui(Wendy) Wang, Yingying Chen,

  56. Metadata-guided Evaluation of Resource-constrained Queries in Content Caching Based Wireless Networks, [pdf], [BibTex], [Google Scholar]

    Springer Wireless Networks (WiNET), the Journal of Mobile Communication, Computation and Information, Volume 17, Issue 8, Pages 1833-1850, 2011.

  57. Song Liu, Larry J. Greenstein, Wade Trappe, Yingying Chen,

  58. Detecting Anomalous Spectrum Usage in Dynamic Spectrum Access Networks, [pdf], [BibTex], [Google Scholar]

    Ad Hoc Networks, Special Issue on Cognitive Radio Ad Hoc Networks, Volume 10, Issue 5, Pages 831-844, 2012.

  59. Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen,

  60. Exploiting Jamming-Caused Neighbor Changes for Jammer Localization, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 23,Issue 3, Pages547-555, 2011.

  61. Jie Yang, Yingying Chen, Jerry Cheng,

  62. Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments,

    Ad Hoc & Sensor Wireless Networks (AHSWN), Volume 11 , No.3-4 , Pages 307-329, 2011.

  63. Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu,

  64. Determining the Position of a Jammer Using a Virtual-Force Iterative Approach, [pdf], [BibTex], [Google Scholar]

    Springer Wireless Networks (WiNET), the Journal of Mobile Communication, Computation and Information, Volume 16, Pages 1-17, October 2010.

  65. Jie Yang, Yanzhi Ren, Yingying Chen and Mooi Choo Chuah,

  66. A Social Community Based Approach for Reducing the Propagation of Infectious Diseases in Healthcare, [pdf], [BibTex], [Google Scholar]

    ACM SIGMOBILE Mobile Computing and Communications Review (ACM MC2R), 2010.

  67. Yingying Chen , Hui Wang, Xiuyuan Zheng, and Jie Yang,

  68. A Reinforcement Learning-Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks, [pdf], [BibTex], [Google Scholar]

    in EURASIP Journal on Wireless Communications and Networking (EURASIP JWCN), vol. 2010, Article ID 319275, June 2010.

  69. Yingying Chen, Jie Yang, Wade Trappe, Richard P. Martin,

  70. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Vehicular Technology (IEEE TVT), Volume 59, Issue5, pp. 2418 - 2434, June 2010.

  71. Konstantinos Kleisouris, Yingying Chen, Jie Yang, Richard P. Martin,

  72. Performance Analysis of Wireless Localization When Using Multiple Antennas,

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), November 2010.

  73. Shu Chen, Yingying Chen, Wade Trappe,

  74. Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 21, Issue 5, Pages 722 - 736, 2010.

  75. Gayathri Chandrasekaran, Mesut Ergin, Marco Gruteser, Rich Martin, Jie Yang, Yingying Chen,

  76. DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 8, Number 12, December 2009.

  77. Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin,

  78. A Security and Robustness Performance Analysis of Localization Algorithms to Signal Strength Attacks, [pdf], [BibTex], [Google Scholar]

    ACM Transactions on Sensor Networks (ACM TOSN), Volume 5, Issue 1, February 2009.

  79. Shu Chen, Yingying Chen, Wade Trappe,

  80. Exploiting Environmental Properties for Wireless Localization, [pdf], [BibTex], [Google Scholar]

    ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Volume 12, Issue 1, Pages 49-51, 2008.

  81. Yingying Chen, Gayathri Chandrasekaran, Eiman Elnahrawy, John-Austen Francisco, Konstantinos Kleisouris, Xiaoyan Li, Richard P. Martin, Robert S. Moore, Begumhan Turgut,

  82. GRAIL: A General Purpose Localization System, [pdf], [BibTex], [Google Scholar]

    Sensor Review, special edition, Localization Systems, Vol. 28, No. 2, pp.115-124, 2008.

  83. Constantin Serban, Yingying Chen, Wenxuan Zhang, and Naftaly Minsky,

  84. The concepts of Decentralized and Secure Electronic Marketplace, [pdf], [BibTex], [Google Scholar]

    Electronic Commerce Research (ECR) Journal, Volume 8, Issue 1-2, Pages 79-101, 2008.

Magazine Articles

  1. Joseph Mitola III, Joseph Guerci, Jeff Reed, Yu-Dong Yao, Yingying Chen, T. Charles Clancy, Johanna Dwyer, Hongbin Li, Hong Man, Robert McGwier, and Yi Guo

  2. Accelerating 5G QoE via Public-Private Spectrum Sharing, [pdf], [BibTex], [Google Scholar]

    IEEE Communications Magazine, Volume 52, No. 5, Pages 77-85, May 2014. 

  3. Yan Wang, Yingying Chen, and Richard P. Martin

  4. Leveraging Wi-Fi Signals to Monitor Human Queues,

    IEEE Pervasive Computing Magazine, Volume 13, No. 2, Pages 14-17, April-June 2014. 

  5. Guoru Ding, Qihui Wu, Yu-Dong Yao, Jinlong Wang, and Yingying Chen,

  6. Kernel-based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions, [pdf], [BibTex], [Google Scholar]

    IEEE Signal Processing Magazine, Volume 30, No. 4, Pages 126-136, July 2013. (Top 25 most frequency downloaded documents in June 2013 and July 2013 [link])

  7. Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen,

  8. Detecting Wormhole Attacks in Delay Tolerant Networks, [pdf], [BibTex], [Google Scholar]

    in IEEE Wireless Communications Magazine (IEEE WCM), special issue on Security & Privacy, Volume.17, No. 5, Pages 36-42, October 2010. (Acceptance ratio: 17.9%)