Publications

 

Go back to Yingying's Home


Books

Yingying Chen, Wenyuan Xu, Wade Trappe, Yanyong Zhang, Securing Emerging Wireless Systems,
ISBN:978-0-387-88490-5,Springer, 2009.
   
Jie Yang, Yingying Chen, Wade Trappe, and Jerry Cheng, Pervasive Wireless Environments: Detecting and Localizing User Spoofing,
ISBN: 978-3-319-07355-2,Springer, 2014.

Book Chapters

  1. Yingying Chen and Jie Yang, "Defending against Identity-Based Attacks in Wireless Networks", Securing Cyber-Physical Infrastructures: Foundations and Challenges, Sajal Das, Krishna Kant and Nan Zhang (eds.), Morgan Kaufmann, 2012.

  2. Jie Yang, Yingying Chen, Richard P. Martin, Wade Trappe and Marco Gruteser, "On the Performance of Wireless Indoor Localization Using Received Signal Strength", Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE, chapter 12, 2011.

  3. Yingying Chen, Jie Yang, Wade Trappe and Richard P. Martin, "Impact of Anchor Placement and Anchor Selection on Localization Accuracy", Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE, chapter 13, 2011.

Journal Papers

  1. Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen, H. Vincent Poor,

  2. Authenticating Users through Fine-grained Channel Information,

    IEEE Transactions on Mobile Computing (IEEE TMC), 2017. (To appear)

  3. Chen Wang, Xiuyuan Zheng, Yingying Chen, Jie Yang,

  4. Locating Rogue Access Point using Fine-grained Channel Information,

    IEEE Transactions on Mobile Computing (IEEE TMC), 2017. (To appear)

  5. Hongbo Liu, Yingying Chen, Mooi Choo Chuah, Jie Yang, H. Vincent Poor,

  6. Enabling Self-healing Smart Grid Through Jamming Resilient Local Controller Switching, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Volume 14, Issue 4, Pages 377-391, 2017.

  7. Jiadi Yu, Zhongyang Chen, Yanmin Zhu, Yingying Chen, Linghe Kong, Minglu Li,

  8. Fine-grained Abnormal Driving Behaviors Detection and Identification with Smartphones, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 8, Pages 2198-2212, 2017.

  9. Yan Wang, Yingying Chen, Jie Yang, Luyang Liu, Marco Gruteser, Richard P. Martin, Hongbo Liu,

  10. Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 8, Pages 1965-1981, 2016.

  11. Wen Ji, Yingying Chen, Bo-Wei Chen, Yiqiang Chen, Sun-Yuan Kung,

  12. Profit Maximization through Online Advertising Scheduling for a Wireless Video Broadcast Network, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 8, Pages 2064-2079, 2016.

  13. Jiadi Yu, Haofu Han, Hongzi Zhu, Yingying Chen, Jie Yang, Yanmin Zhu, Guangtao Xue and Minglu Li,

  14. SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 1, Pages 202-216, 2016.

  15. Tao Shu, Yingying Chen, Jie Yang,

  16. Protecting Multi-Lateral Localization Privacy in Pervasive Environments, [pdf], [BibTex], [Google Scholar]

    IEEE/ACM Transactions on Networking (IEEE/ACM ToN), Volume 23, Issue 5, Pages 1688-1701, 2015.

  17. Xin Dong, Jiadi Yu, Yanmin Zhu, Yingying Chen, Yuan Luo, and Minglu Li,

  18. SECO: Secure and Scalable Data Collaboration Services in Cloud Computing, [pdf], [BibTex], [Google Scholar]

    Computers & Security, Volume 50, Issue 9, Pages 91-105, 2015.

  19. Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, and Jie Yang,

  20. User Verification Leveraging Gait Recognition For Smartphone Enabled Mobile Healthcare Systems, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 14, Issue 9, Pages 1961-1974, 2015.

  21. Xiuyuan Zheng, Jie Yang, Yingying Chen, and Hui Xiong,

  22. An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 14, Issue 6, Pages 1138-1150, 2015.

  23. Jiadi Yu, Haofu Han, Hongzi Zhu, Yingying Chen, Jie Yang, Yanmin Zhu, Guangtao Xue, and Minglu Li,

  24. Sensing Human-Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 14, Issue 8, Pages 1698-1711, 2015.

  25. Yanzhi Ren, Jie Yang, Mooi Choo Chuah, and Yingying Chen,

  26. Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones, [pdf], [BibTex], [Google Scholar]

    Ad Hoc & Sensor Wireless Networks (AHSWN), Volume 27, No. 1-2, Pages 51-73, 2015.

  27. Wenlin Zhang, Yi Guo, Hongbo Liu, Yingying Chen, Zheng Wang, and Joseph Mitola III,

  28. Distributed Consensus-based Weight Design for Cooperative Spectrum Sensing, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 26, Issue 1, Pages 54-64, 2014.

  29. Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, and C. Emre Koksal,

  30. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 13, Issue 12, Pages 2820-2835, 2014.

  31. Hongbo Liu, Jie Yang, Simon Sidhom, Yan Wang, Yingying Chen, Fan Ye,

  32. Accurate WiFi Based Localization for Smartphones Using Peer Assistance, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), 2014, Volume 13, No.10, Pages 2199 - 2214, 2014.

  33. Xiuyuan Zheng, Hongbo Liu, Jie Yang, Yingying Chen, Richard P. Martin, and Xiaoyan Li, [pdf], [BibTex], [Google Scholar]

  34. A Study of Localization Accuracy using Multiple Frequencies and Powers,

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 25, Issue 8, Pages 1955-1965, 2014.

  35. Hongbo Liu, Hui Wang, and Yingying Chen,

  36. Defending against Frequency-based Attacks on Distributed Data Storage in Wireless Networks, [pdf], [BibTex], [Google Scholar]

    ACM Transactions on Sensor Networks (ACM TOSN), Volume 10, Issue 3, Pages 49:1-49:37 2014.

  37. Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, Minglu Li,

  38. Achieving an Effective, Scalable and Privacy-preserving Data Sharing Service in Cloud Computing, [pdf], [BibTex], [Google Scholar]

    Computers & Security, Volume 42, Pages 151-164, 2014.

  39. Yan Wang, Mooi Choo Chuah and Yingying Chen,

  40. Incentive Based Data Sharing in Delay Tolerant Mobile Networks, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Wireless Communications (IEEE TWC), Volume.3, No.1, Pages.370-381, 2014.

  41. Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen,

  42. An Error Minimizing Framework for Localizing Jammers in Wireless Networks, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume.25, No.2, Pages.508-517, 2014.

  43. Jie Yang, Yingying Chen, Wade Trappe, and Jerry Cheng,

  44. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 24, No.1, Pages 44-58, 2013.

  45. Guoru Ding, Jinlong Wang, Qihui Wu, Fei Song,and Yingying Chen,

  46. Spectrum Sensing in Opportunity-Heterogeneous Cognitive Sensor Networks: How to Cooperate?, [pdf], [BibTex], [Google Scholar]

    IEEE Sensors Journal, Volume 13, No. 11, Pages. 4247-4255, November. 2013.

  47. Xiuyuan Zheng, Yingying Chen, Hui Wang, Hongbo Liu, Ruilin Liu,

  48. Neighborhood Prediction Based Decentralized Key Management for Mobile Wireless Networks, [pdf], [BibTex], [Google Scholar]

    Springer Wireless Networks (WiNET), the Journal of Mobile Communication, Computation and Information, Volume 19, Issue 6, pp 1387-1406, August 2013.

  49. Jie Yang, Simon Sidhom, Gayathri Chandrasekaran, Tam Vu, Hongbo Liu, Nicolae Cecan, Yingying Chen, Marco Gruteser, Richard P. Martin,

  50. Sensing Driver Phone Use with Acoustic Ranging Through Car Speakers, Editorial Notes, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume11, No.9, Pages 1426-1440, 2012.

  51. Xiaoyan Li, Yingying Chen, Jie Yang, and Xiuyuan Zheng,

  52. Achieving Robust Wireless Localization Resilient to Signal Strength Attacks, [pdf], [BibTex], [Google Scholar]

    Springer Wireless Networks (WiNET), the Journal of Mobile Communication, Computation and Information, Volume 18, Issue 1, Pages 45-58, 2012.

  53. Jie Yang and Yingying Chen,

  54. Towards Attack Resistant Localization under Infrastructure Attacks, [pdf], [BibTex], [Google Scholar]

    Security and Communication Networks (SCN), Wiley, Volume 5, Issue 4, Pages 384-403, 2012.

  55. Ruilin Liu, Xiuyuan Zheng, Hongbo Liu, Hui(Wendy) Wang, Yingying Chen,

  56. Metadata-guided Evaluation of Resource-constrained Queries in Content Caching Based Wireless Networks, [pdf], [BibTex], [Google Scholar]

    Springer Wireless Networks (WiNET), the Journal of Mobile Communication, Computation and Information, Volume 17, Issue 8, Pages 1833-1850, 2011.

  57. Song Liu, Larry J. Greenstein, Wade Trappe, Yingying Chen,

  58. Detecting Anomalous Spectrum Usage in Dynamic Spectrum Access Networks, [pdf], [BibTex], [Google Scholar]

    Ad Hoc Networks, Special Issue on Cognitive Radio Ad Hoc Networks, Volume 10, Issue 5, Pages 831-844, 2012.

  59. Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen,

  60. Exploiting Jamming-Caused Neighbor Changes for Jammer Localization, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 23,Issue 3, Pages547-555, 2011.

  61. Jie Yang, Yingying Chen, Jerry Cheng,

  62. Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments,

    Ad Hoc & Sensor Wireless Networks (AHSWN), Volume 11 , No.3-4 , Pages 307-329, 2011.

  63. Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu,

  64. Determining the Position of a Jammer Using a Virtual-Force Iterative Approach, [pdf], [BibTex], [Google Scholar]

    Springer Wireless Networks (WiNET), the Journal of Mobile Communication, Computation and Information, Volume 16, Pages 1-17, October 2010.

  65. Jie Yang, Yanzhi Ren, Yingying Chen and Mooi Choo Chuah,

  66. A Social Community Based Approach for Reducing the Propagation of Infectious Diseases in Healthcare, [pdf], [BibTex], [Google Scholar]

    ACM SIGMOBILE Mobile Computing and Communications Review (ACM MC2R), 2010.

  67. Yingying Chen , Hui Wang, Xiuyuan Zheng, and Jie Yang,

  68. A Reinforcement Learning-Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks, [pdf], [BibTex], [Google Scholar]

    in EURASIP Journal on Wireless Communications and Networking (EURASIP JWCN), vol. 2010, Article ID 319275, June 2010.

  69. Yingying Chen, Jie Yang, Wade Trappe, Richard P. Martin,

  70. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Vehicular Technology (IEEE TVT), Volume 59, Issue5, pp. 2418 - 2434, June 2010.

  71. Konstantinos Kleisouris, Yingying Chen, Jie Yang, Richard P. Martin,

  72. Performance Analysis of Wireless Localization When Using Multiple Antennas,

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), November 2010.

  73. Shu Chen, Yingying Chen, Wade Trappe,

  74. Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 21, Issue 5, Pages 722 - 736, 2010.

  75. Gayathri Chandrasekaran, Mesut Ergin, Marco Gruteser, Rich Martin, Jie Yang, Yingying Chen,

  76. DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 8, Number 12, December 2009.

  77. Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin,

  78. A Security and Robustness Performance Analysis of Localization Algorithms to Signal Strength Attacks, [pdf], [BibTex], [Google Scholar]

    ACM Transactions on Sensor Networks (ACM TOSN), Volume 5, Issue 1, February 2009.

  79. Shu Chen, Yingying Chen, Wade Trappe,

  80. Exploiting Environmental Properties for Wireless Localization, [pdf], [BibTex], [Google Scholar]

    ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Volume 12, Issue 1, Pages 49-51, 2008.

  81. Yingying Chen, Gayathri Chandrasekaran, Eiman Elnahrawy, John-Austen Francisco, Konstantinos Kleisouris, Xiaoyan Li, Richard P. Martin, Robert S. Moore, Begumhan Turgut,

  82. GRAIL: A General Purpose Localization System, [pdf], [BibTex], [Google Scholar]

    Sensor Review, special edition, Localization Systems, Vol. 28, No. 2, pp.115-124, 2008.

  83. Constantin Serban, Yingying Chen, Wenxuan Zhang, and Naftaly Minsky,

  84. The concepts of Decentralized and Secure Electronic Marketplace, [pdf], [BibTex], [Google Scholar]

    Electronic Commerce Research (ECR) Journal, Volume 8, Issue 1-2, Pages 79-101, 2008.

Magazine Articles

  1. Joseph Mitola III, Joseph Guerci, Jeff Reed, Yu-Dong Yao, Yingying Chen, T. Charles Clancy, Johanna Dwyer, Hongbin Li, Hong Man, Robert McGwier, and Yi Guo

  2. Accelerating 5G QoE via Public-Private Spectrum Sharing, [pdf], [BibTex], [Google Scholar]

    IEEE Communications Magazine, Volume 52, No. 5, Pages 77-85, May 2014. 

  3. Yan Wang, Yingying Chen, and Richard P. Martin

  4. Leveraging Wi-Fi Signals to Monitor Human Queues,

    IEEE Pervasive Computing Magazine, Volume 13, No. 2, Pages 14-17, April-June 2014. 

  5. Guoru Ding, Qihui Wu, Yu-Dong Yao, Jinlong Wang, and Yingying Chen,

  6. Kernel-based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions, [pdf], [BibTex], [Google Scholar]

    IEEE Signal Processing Magazine, Volume 30, No. 4, Pages 126-136, July 2013. (Top 25 most frequency downloaded documents in June 2013 and July 2013 [link])

  7. Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen,

  8. Detecting Wormhole Attacks in Delay Tolerant Networks, [pdf], [BibTex], [Google Scholar]

    in IEEE Wireless Communications Magazine (IEEE WCM), special issue on Security & Privacy, Volume.17, No. 5, Pages 36-42, October 2010. (Acceptance ratio: 17.9%)

Refereed Conference Publications

    2017

  1. Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena,

  2. VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration,

    in Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS 2017),

    Dallas, USA, October-November 2017. (Acceptance rate: 151/843 = 17.9%)

  3. Xiaonan Guo, Bo Liu, Cong Shi, Hongbo Liu, Yingying Chen, Mooi Choo Chuah,

  4. WiFi-Enabled Smart Human Dynamics Monitoring,

    in Proceedings of the 15th ACM Conference on Embedded Networked Sensor Systems (SenSys 2017),

    Delft, The Netherlands, November, 2017. (Acceptance rate: 26/151 = 17.2%)

  5. Hongbo Liu, Bo Liu, Cong Shi, Yingying Chen,

  6. Secret Key Distribution Leveraging Color Shift Over Visible Light Channel,

    in Proceedings of IEEE Conference on Communications and Network Security (CNS 2017),

    Las Vegas, USA, October, 2017.

  7. Yudi Dong, Jian Liu, Yingying Chen, Woo Lee,

  8. SalsaAsst: Beat Counting System Empowered by Mobile Devices to Assist Salsa Dancers,

    in Proceedings of the 14th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2017),

    Orlando, Florida, USA, October 2017.

  9. Guo Liu, Jian Liu, Fangmin Li, Xiaolin Ma, Yingying Chen, Hongbo Liu,

  10. SubTrack: Enabling Real-time Tracking of Subway Riding on Mobile Devices,

    in Proceedings of the 14th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2017),

    Orlando, Florida, USA, October 2017.

  11. Cong Shi, Jian Liu, Hongbo Liu, Yingying Chen,

  12. Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT,

    in Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2017),

    Chennai, India, July 2017. (Acceptance rate: 27/179 = 15.1%)

  13. Luyang Liu, Hongyu Li, Jian Liu, Cagdas Karatas, Yan Wang, Marco Gruteser, Yingying Chen, Richard Martin,

  14. BigRoad: Scaling Massive Road Data Acquisition for Dependable Self-Driving, [pdf]

    in Proceedings of the 15th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2017),

    Niagara Falls, NY, USA, June 2017. (Acceptance rate: 34/191 = 17.8%)

  15. Jian Liu, Yingying Chen, Marco Gruteser, Yan Wang,

  16. VibSense: Sensing Touches on Ubiquitous Surfaces through Vibration, [pdf]

    in Proceedings of the 14th IEEE International Conference on Sensing, Communication and Networking (SECON 2017),

    San Diego, CA, USA, June 2017. (Acceptance rate: 45/170 = 26.5%)

    - Best Paper Award

  17. Chen Wang, Chuyu Wang, Yingying Chen, Lei Xie, Sanglu Lu,

  18. Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points, [pdf]

    in Proceedings of IEEE International Conference on Distributed Computing (ICDCS 2017),

    Atlanta, GA, USA, June 2017. (Acceptance rate: 90/531 = 16.9%)

  19. Xiaonan Guo, Jian Liu, Yingying Chen,

  20. FitCoach: Virtual Fitness Coach Empowered by Wearable Mobile Devices, [pdf]

    in Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM 2017),

    Atlanta, GA, USA, May 2017. (Acceptance rate: 292/1395 = 20.93%)

  21. Xiangyu Xu, Hang Gao, Jiadi Yu, Yingying Chen, Yanmin Zhu, Guangtao Xue, Minglu Li,

  22. ER: Early Recognition of Inattentive Driving Leveraging Audio Devices on Smartphones, [pdf]

    in Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM 2017),

    Atlanta, GA, USA, May 2017. (Acceptance rate: 292/1395 = 20.93%)

    2016

  23. Linghan Zhang, Sheng Tan, Jie Yang, Yingying Chen,

  24. VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones, [pdf]

    in Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS 2016),

    Vienna, Austria, October, 2016. (Acceptance rate: 137/831 = 16.5%)

  25. Chen Wang, Xiaonan Guo, Yan Wang, Yingying Chen, Bo Liu,

  26. Friend or Foe? Your Wearable Devices Reveal Your Personal PIN, [pdf], [Presentation Slides]

    in Proceedings of the 11th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2016),

    Xi'an, China, May 2016. (Acceptance rate: 20.9%)

    - Best Paper Award

    - Prof. Yingying Chen is the lead researcher and the corresponding author of this paper.

  27. Qinghan Xue, Mooi Choo Chuah, Yingying Chen,

  28. Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS), [pdf]

    in Proceedings of the 11th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2016),

    Xi'an, China, May 2016. (Acceptance rate: 20.9%)

  29. Musaab Alaziz, Zhenhua Jia, Jian Liu, Richard Howard, Yingying Chen, Yanyong Zhang,

  30. MotionScale: A Body Motion Monitoring System Using Bed-Mounted Wireless Load Cells, [pdf]

    in Proceedings of IEEE International Conference on Connected Health: Applications, Systems and Engineering Technologies (IEEE CHASE 2016),

    Washington DC, USA, June 2016.

  31. Mostafa Izz, Zhongyuan Li, Hongbo Liu, Yingying Chen, Feng Li,

  32. Uber-in-Light: Unobtrusive Visible Light Communication Leveraging Complementary Color Channel, [pdf]

    in Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM 2016),

    San Francisco, USA, April 2016. (Acceptance rate: 300/1644 = 18.25%)

  33. Cagdas Karatas, Luyang Liu, Hongyu Li, Jian Liu, Yan Wang, Sheng Tan, Jie Yang, Yingying Chen, Marco Gruteser, Richard Martin,

  34. Leveraging Wearables for Steering and Driver Tracking, [pdf]

    in Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM 2016),

    San Francisco, USA, April 2016. (Acceptance rate: 300/1644 = 18.25%)

    2015

  35. Jiadi Yu, Jiaming Zhao, Yingying Chen, Jie Yang,

  36. Sensing Ambient Light for User Experience-Oriented Color Scheme Adaptation on Smartphone Displays, [pdf]

    in Proceedings of the The 13th ACM Conference on Embedded Networked Sensor (SenSys 2015),

    Seoul, South Korea, November 2015. (Acceptance rate: 27/132 = 20.5%)

  37. Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, Jie Yang,

  38. Critical Segment Based Real-time E-Signature for Securing Mobile Transactions, [pdf], [BibTex], [Google Scholar]

    in Proceedings of IEEE Conference on Communications and Network Security (IEEE CNS 2015),

    Florence, Italy, September 2015.

  39. Jian Liu, Yan Wang, Gorkem Kar, Yingying Chen, Jie Yang, Marco Gruteser,

  40. Snooping Keystrokes with mmlevel Audio Ranging on a Single Phone, [pdf], [BibTex], [Google Scholar], [Video Demo]

    in Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (MobiCom 2015),

    Paris, France, September 2015. (Acceptance rate: 38/207 = 18.4%)

  41. Jian Liu, Yan Wang, Yingying Chen, Jie Yang, Xu Chen, Jerry Cheng,

  42. Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi, [pdf], [BibTex], [Google Scholar], [Video Demo]

    in Proceedings of the 16th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2015),

    Hangzhou, China, June 2015. (Acceptance rate: 14.8%)

  43. Shubham Jain, Carlo Borgiattino, Yanzhi Ren, Marco Gruteser, Yingying Chen, Carla-Fabiana Chiasserini,

  44. LookUp: Enabling Pedestrian Safety Services via Shoe Sensing, [pdf], [BibTex], [Google Scholar], [Video Demo]

    in Proceedings of the 13th International Conference on Mobile Systems, Applications, and Services (MobiSys 2015),

    Florence, Italy, May 2015. (Acceptance rate: 29/219 = 12%)

  45. Yan Wang, Yingying Chen, Fan Ye, Jie Yang, Hongbo Liu,

  46. Towards Understanding the Advertiser's Perspective of Smartphone User Privacy, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 35th IEEE International Conference on Distributed Computing System (ICDCS 2015),

    Columbus, Ohio, June 2015. (Acceptance rate: 70/543 = 12.8%)

  47. Zhongyang Chen, Jiadi Yu, Yanmin Zhu Yingying Chen, Minglu Li,

  48. D3: Abnormal Driving Behaviors Detection and Identification using Smartphone Sensors, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015),

    Seattle, Washington, June 2015.

  49. Yanzhi Ren, Chen Wang, Jie Yang, Yingying Chen,

  50. Fine-grained Sleep Monitoring: Hearing Your Breathing with Smartphones, [pdf], [BibTex], [Google Scholar], [Video Demo]

    in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2015),

    Hong Kong, China, April 2015. (Acceptance rate: 316/1640 = 19.3%)

    2014

  51. Gorkem Kar, Hossen Mustafa, Yan Wang, Yingying Chen, Wenyuan Xu, Marco Gruteser, Tam Vu,

  52. Detection of On-Road Vehicles Emanating GPS Interference, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the ACM Conference on Computer and Communications Security (CCS 2014),

    Scottsdale, Arizona, Nov. 2014. (Acceptance rate: 114/585 = 19.5%)

  53. Xiuyuan Zheng, Chen Wang, Yingying Chen, Jie Yang,

  54. Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE Conference on Communications and Network Security (IEEE CNS 2014),

    San Fransisco, CA, Oct. 2014.

    - Best Paper Award

  55. Yan Wang, Jian Liu, Yingying Chen, Marco Gruteser, Jie Yang, Hongbo Liu,

  56. E-eyes: Device-free Location-oriented Activity Identification Using Fine-grained WiFi Signatures, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (MobiCom 2014),

    Maui, Hawii, Sept. 2014. (Acceptance rate: 36/220 = 16.4%)

  57. Yan Wang, Jie Yang, Yingying Chen, Hongbo Liu, Marco Gruteser, Richard P. Martin

  58. Tracking Human Queues Using Single-Point Signal Monitoring, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 12th International Conference on Mobile Systems, Applications, and Services (MobiSys 2014),

    New Hampshire, USA, June 2014. (Acceptance rate: 25/185 = 13.5%)

  59. Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie,

  60. Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing, [pdf], [BibTex]

    in Proceedings of the IEEE Global Communications Conference (IEEE Globecom 2014),

    Austin, Texas, 2014.

  61. Chao Jiang, Muhammad Fahad, Yi Guo, Jie Yang, Yingying Chen,

  62. Robot-Assisted Human Indoor Localization Using the Kinect Sensor and Smartphones, [pdf]

    in IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2014.

  63. Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen,

  64. Practical User Authentication Leveraging Channel State Information (CSI), [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014),

    Kyoto, Japan, June 2014.(Acceptance rate: 52/260 = 20%)

  65. Tao Shu, Yingying Chen, Jie Yang, and Albert Williams,

  66. Multi-lateral Privacy-Preserving Localization in Pervasive Environments, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2014),

    Toronto, Canada, April 2014.(Acceptance rate: 320/1645 = 19.4%)

  67. Haofu Han, Jiadi Yu, Hongzi Zhu, Yingying Chen, Jie Yang, Yanmin Zhu, Guangtao Xue and Minglu Li,

  68. SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2014),

    Toronto, Canada, April 2014.(Acceptance rate: 320/1645 = 19.4%)

    2013

  69. Haofu Han, Jiadi Yu, Hongzi Zhu, Yingying Chen, Jie Yang, Guangtao Xue, Yanmin Zhu, Minglu Li,

  70. E3: Energy-Efficient Engine for Frame Rate Adaptation on Smartphones, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (ACM SenSys 2013),

    Rome, Italy, November 2013.(Acceptance rate: 21/123 = 17%)

  71. Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, and Minglu Li,

  72. P2E: Privacy-preserving and Effective Cloud Data Sharing Service, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE Global Communications Conference (IEEE Globecom),

    Atlanta, Georgia, December 2013.

  73. Hongbo Liu, Yingying Chen, Mooi Choo Chuah, Jie Yang,

  74. Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming, [pdf], [BibTex], [Google Scholar]

    in Proceedings of IEEE Conference on Communications and Network Security (IEEE CNS 2013),

    Washington, D.C., USA, October 2013.

    - Best Paper Runner-Up.

  75. Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, Richard P. Martin,

  76. Sensing Vehicle Dynamics for Determining Driver Phone Use, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 11th International Conference on Mobile Systems, Applications, and Services (ACM MobiSys 2013),

    Taipei, Taiwan, June 2013. (Acceptance rate: 33/210=15.7%)

  77. Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, Jie Yang,

  78. Smartphone Based User Verification Leveraging Gait Recognition For Mobile Healthcare Systems, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 2013),

    New Orleans, LA, June 2013.

  79. Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, Minglu Li,

  80. Achieving Secure and Efficient Data Collaboration in Cloud Computing, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE/ACM International Symposium on Quality of Service (IEEE/ACM IWQoS 2013),

    Montreal, Canada, June 2013. (Short paper)

  81. Hongbo Liu, Yan Wang, Jie Yang, Yingying Chen, [pdf], [BibTex], [Google Scholar]

  82. Fast and Practical Secret Key Extraction by Exploiting Channel Response,

    in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2013),

    Turin, Italy, April 2013. (Acceptance rate: 17%)

  83. Xiuyuan Zheng, Yu Gan, Jie Yang, Yingying Chen,

  84. Adaptive Device-Free Passive Localization Coping with Dynamic Target Speed, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2013) ,

    mini-conference, Turin, Italy, April 2013. (Acceptance rate: 25%)

  85. Shan Zhou, Jie Yang, Dahai Xu, Guangzhi Li, Yu Jin, Zihui Ge, Mario Kosseifi, Robert Doverspike, Yingying Chen, Lei Ying,

  86. Proactive Call Drop Avoidance in UMTS Networks, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2013) ,

    mini-conference, Turin, Italy, April 2013. (Acceptance rate: 25%)

    2012

  87. Hongbo Liu, Yu Gan, Jie Yang, Simon Sidhom, Yan Wang, Yingying Chen, Fan Ye,

  88. Push the Limit of WiFi based Localization for Smartphones, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2012), Pages 305-316

    Istanbul, Turkey, August 2012. (Acceptance rate: 32/212 = 15%)

    - Here are the presentation slides and demo.

  89. Jie Yang, Yingying Chen, Sanjay Macwan, Cristina Serban, Shu Chen, Wade Trappe,

  90. Securing Mobile Location-based Services through Position Verification Leveraging Key Distribution, [pdf], [BibTex], [Google Scholar]

    in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC),

    Paris, France, April 2012.

  91. Yanzhi Ren, Yingying Chen, Mooi Choo Chuah,

  92. Social Closeness Based Clone Attack Detection for Mobile Healthcare System, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 9th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012),

    Las Vegas, Nevada, October 2012.

  93. Zhenhua liu, Hongbo Liu, Wenyuan Xu and, Yingying Chen,

  94. Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 9th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012),

    Las Vegas, Nevada, October 2012.

  95. Yan Wang, Mooi-Choo Chuah, Yingying Chen,

  96. Incentive Driven Information Sharing in Delay Tolerant Mobile Networks, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE Global Communications Conference 2012 Wireless Networking Symposium (IEEE Globecom),

    Anaheim, California, December 2012.

  97. Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen,

  98. Collaborative Secret Key Extraction Leveraging Received Signal Strength in Mobile Wireless Networks, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2012),

    Orlando, Florida USA, March 2012. (Acceptance rate: 18%)

    2011

  99. Jie Yang, Simon Sidhom, Gayathri Chandrasekaran, Tam Vu, Hongbo Liu, Nicolae Cecan, Yingying Chen, Marco Gruteser, Richard P. Martin,

  100. Detecting Driver Phone Use Leveraging Car Speakers, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 17th Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2011),

    Las Vegas, Nevada, USA, September 2011. (Acceptance rate: 13.5%)

    - Best Paper Award. Here are the presentation slides.

  101. Yanzhi Ren, Jie Yang, Mooi Choo Chuah, Yingying Chen,

  102. Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems (IEEE MASS), concise paper,

    Valencia, Spain, 2011.

  103. Wenlin Zhang, Zheng Wang, Yi Guo, Hongbo Liu, Yingying Chen, Joseph Mitola III,

  104. Distributed Cooperative Spectrum Sensing based on Weighted Average Consensus, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE Global Communications Conference 2009 Wireless Networking Symposium (IEEE Globecom),

    Houston, Texas, 2011.

  105. Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen,

  106. Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE Global Communications Conference 2009 Wireless Networking Symposium (IEEE Globecom),

    Houston, Texas, 2011.

  107. Hongbo Liu, Zhenhua Liu, Yingying Chen, and Wenyuan Xu, 

  108. Localizing Multiple Jamming Attackers in Wireless Networks, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the International Conference on Distributed Computing Systems (IEEE ICDCS 2011),

    Minneapolis, MN, USA, June 2011. (Acceptance rate: 15%)

  109. Gayathri Chandrasekaran, Tam Vu, Alex Varshavsky, Marco Gruteser, Richard P. Martin, Jie Yang and Yingying Chen,

  110. Tracking Vehicular Speed Variations by Warping Mobile Phone Signal Strengths, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE International Conference on Pervasive Computing and Communication (IEEE PerCom 2011),

    Seattle, USA, March 2011. (Acceptance rate: 11%)

  111. Xiaoyan Li, Yingying Chen, Jie Yang and Xiuyuan Zheng,

  112. Designing Localization Algorithms Robust to Signal Strength Attacks, [pdf], [BibTex], [Google Scholar]

    in Proceeding of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2011),

    mini-Conference, Shanghai, P.R. China, March 2011. (Acceptance rate: 291/1823+136/1823 = 23.4%)

    2010

  113. Jie Yang, Jerry Cheng and Yingying Chen

  114. Mobile Sensing Enabled Robust Detection of Security Threats in Urban Environments, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (ICST Qshine),

    Houston, Texas, USA, Nov. 2010. - Invited Paper

  115. Xiuyuan Zheng, Hui Wang, Yingying Chen, Hongbo Liu, Ruilin Liu,

  116. A Decentralized Key Management Scheme via Neighborhood Prediction in Mobile Wireless Networks, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 7th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (IEEE MASS 2010),

    San Francisco, California, November 2010. (Acceptance rate: 51/185 = 27.6%)

  117. Xiuyuan Zheng, Hongbo Liu, Jie Yang, Yingying Chen, John-Austen Francisco, Richard P. Martin, Xiaoyan Li,

  118. Characterizing the Impact of Multi-frequency and Multi-power on Localization Accuracy, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 7th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (IEEE MASS 2010),

    San Francisco, California, November 2010. (Acceptance rate: 51/185 = 27.6%)

  119. Jie Yang, Alexander Varshavsky, Hongbo Liu, Yingying Chen and Marco Gruteser,

  120. Accuracy Characterization of Cell Tower Localization (Note), [pdf], [BibTex], [Google Scholar]  

    in Proceedings of the 12th ACM International Conference on Ubiquitous Computing (UbiComp 2010),

    Copenhagen, Denmark, September 2010. (Acceptance rate: 39/202 = 19.3%)

  121. Gayathri Chandrasekaran, Tam Vu, Alex Varshavsky, Marco Gruteser, Richard P. Martin, Jie Yang and Yingying Chen,

  122. Vehicular Speed Estimation using GSM Signal Strength Strength from Mobile Phones (Note), [pdf], [BibTex], [Google Scholar]

    in Proceedings of the 12th ACM International Conference on Ubiquitous Computing (UbiComp 2010),

    Copenhagen, Denmark, September 2010. (Acceptance rate: 39/202 = 19.3%)

  123. Hongbo Liu, Hui Wang, Yingying Chen,

  124. Ensuring Data Storage Security against Frequency-based Attacks in Wireless Networks, [pdf], [BibTex], [Google Scholar]  

    in Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS 2010),

    Santa Barbara, CA, June 2010.

  125. Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen,

  126. Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges, [pdf], [BibTex], [Google Scholar]  

    in Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS 2010),

    Santa Barbara, CA, June 2010.

  127. Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen,   

  128. MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE WCNC,

    Sydney, Australia, April 2010.

  129. Jie Yang, Yingying Chen, Sachi Desai and Shafik Quoraishee,

  130. Passive Intrusion Detection in Wireless Networks by Exploiting Clustering-based Learning, [BibTex], [Google Scholar]

    in Proceedings of the SPIE, Vol. 7706, 770604 (2010),

    Orlando, Florida, USA, April, 2010.

  131. Jie Yang, Yong Ge, Hui Xiong, Yingying Chen, Hongbo Liu,

  132. Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments, [pdf], [BibTex], [Google Scholar

    in Proceedings of the 29th IEEE International Conference on Computer Communications (IEEE INFOCOM 2010),

    San Diego, April 2010. (276/1575 = 17.5%)

    2009

  133. Jie Yang, Yingying Chen,

  134. Indoor Localization Using Improved RSS-Based Lateration Methods, [pdf], [BibTex], [Google Scholar]  

    in Proceedings of the IEEE Global Communications Conference 2009 Wireless Networking Symposium (Globecom),

    Honolulu, Hawaii, USA, November 2009.

  135. Hui(Wendy) Wang, Ruilin Liu, Xiuyuan Zheng, Yingying Chen, Hongbo Liu,

  136. To Do or Not to Do: Metadata-guided Query Evaluation in Content Caching Networks, [pdf], [BibTex], [Google Scholar]   

    in Proceedings of the IEEE Global Communications Conference 2009 Wireless Networking Symposium (Globecom),

    Honolulu, Hawaii, USA, November 2009.

  137. Yingying Chen, Hui(Wendy) Wang, Xiuyuan Zheng and Jie Yang,

  138. Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks, [pdf], [BibTex], [Google Scholar]    

    in Proceedings of the IEEE MILCOM,

    Boston, MA, October, 2009.

  139. Dov Kruger, Hongyuan Shi, Yingying Chen, Hongbo Liu, Jie Yang and L. Imas,

  140. Using a Multiple Analytical Distribution Filter for Underwater Localization, [pdf], [BibTex], [Google Scholar]  

    in Proceedings of the SPIE Europe's International Symposium on Security & Defence,

    Berlin, Germany, August, 2009.

  141. Jie Yang, Yingying Chen, Wade Trappe,

  142. Detecting Spoofing Attacks in Mobile Wireless Environments, [pdf], [BibTex], [Google Scholar]    

    in Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 2009),

    Rome, Italy, June 2009.(Acceptance rate: 18.8% (81 out of 431))

  143. Gayathri Chandrasekaran, Mesut Ali Ergin, Jie Yang, Song Liu, Yingying Chen, Marco Gruteser, Rich Martin,

  144. Empirical Evaluation of the Limits on Localization Using Signal Strength, [pdf], [BibTex], [Google Scholar]    

    in Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 2009),

    Rome, Italy, June 2009.(Acceptance rate: 18.8% (81 out of 431))

  145. Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng,

  146. Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks, [pdf], [BibTex], [Google Scholar]  

    in Proceedings of the 28th IEEE International Conference on Computer Communications (IEEE INFOCOM 2009),

    Brazil, April 2009. (282/1435 = 20%)

  147. Song Liu, Larry J. Greenstein, Yingying Chen, Wade Trappe,

  148. ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks, [pdf], [BibTex], [Google Scholar]   

    in Proceedings of the 28th IEEE International Conference on Computer Communications (IEEE INFOCOM 2009),

    Brazil, April 2009. (282/1435 = 20%)

  149. Jie Yang, Yingying Chen,

  150. Robust Wireless Localization to Attacks on Access Points, [pdf], [BibTex], [Google Scholar]    

    in Proceedings of the IEEE Sarnoff Symposium 2009,

    Princeton, NJ, March 2009. - Invited Paper

  151. Song Liu, Yingying Chen, Wade Trappe, Larry J. Greenstein,

  152. Non-interactive Localization of Cognitive Radios Based on Dynamic Signal Strength Mapping, [pdf], [BibTex], [Google Scholar]    

    in Proceedings of the Sixth International Conference on Wireless On-demand Network Systems and Services (WONS),

    Snowbird, Utah, February 2009. - Best Paper Award

    2008

  153. Yingying Chen, Jie Yang, Xiuyuan Zheng, Venkataraman Swaminathan,

  154. NORM: A Decentralized Location Verification Mechanism for Wireless Sensor Networks, [pdf], [BibTex], [Google Scholar]    

    in Proceedings of the 26th Army Science Conference,

    Orlando, FL, December 2008.

  155. Yingying Chen, Jie Yang, Fangming He,

  156. A Trusted Infrastructure for Facilitating Access Control of Location Information, [pdf], [BibTex], [Google Scholar]   

    in Proceedings of the IEEE MILCOM,

    San Diego, CA, November 2008.

  157. Gayathri Chandrasekaran, Mesut Ergin, Marco Gruteser, Rich Martin, Jie Yang, Yingying Chen,

  158. DECODE: Detecting Co-Moving Wireless Devices, [pdf], [BibTex], [Google Scholar]    

    in Proceedings of the Fifth IEEE International Conference on Mobile Ad Hoc and Sensor Systems (IEEE MASS 2008),

    Atlanta, GA, September 2008.(Acceptance rate: 20%, short paper)

  159. Konstantinos Kleisouris, Yingying Chen, Jie Yang, Richard P. Martin,

  160. The Impact of Using Multiple Antennas on Wireless Localization, [pdf], [BibTex], [Google Scholar]    

    in Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 2008),

    CA, USA, June 2008.(Acceptance rate: 21% (64 out of 304))

  161. Shu Chen, Yingying Chen, Wade Trappe,

  162. Exploiting Environmental Properties for Wireless Localization and Location Aware Applications, [pdf], [BibTex], [Google Scholar]  

    in Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (IEEE PerCom 2008),

    Hongkong, March 2008. (Acceptance Rate: 11.9% (19 out of 160))

    2006-2007

  163. Yingying Chen, Wade Trappe, Richard P. Martin,

  164. Attack Detection in Wireless Localization, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2007),

    Anchorage, Alaska, USA, April 2007.(Acceptance rate: 18%)

  165. Yingying Chen, Wade Trappe, Richard P. Martin,

  166. Detecting and Localizing Wireless Spoofing Attacks, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 2007),

    San Diego, CA, USA, May 2007.(Acceptance rate: 20%)

  167. Yingying Chen, Wade Trappe, Richard P. Martin,

  168. ADLS: Attack Detection for Wireless Localization Using Least Squares, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications WiP (PerCom 2007),

    White Plains, NY, USA, March 2007.

  169. Yingying Chen, John-Austin Francisco, Wade Trappe, Richard P. Martin,

  170. A Practical Approach to Landmark Deployment for Indoor Localization, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 2006),

    Reston, VA, USA, September 2006.(Acceptance rate: 26%)

  171. Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin,

  172. The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS 2006),

    San Francisco, CA, USA, June 2006.(Acceptance rate: 30%)

  173. Yingying Chen, Constantin Serban, Wenxuan Zhang, and Naftaly Minsky,

  174. Towards a Decentralized and Secure Electronic Marketplace, [pdf], [BibTex], [Google Scholar]

    in Proceedings of the IADIS International Conference on E-Commerce,

    Porto, Portugal, December 2005.(Acceptance rate: 29%)

Refereed Workshop Papers, Posters, and Demos

  1. Jian Liu, Yingying Chen, Marco Gruteser,

  2. Poster: Sensing on Ubiquitous Surfaces via Vibration Signals,

    in Proceedings of the 22nd Annual International Conference on Computing and Networking (MobiCom 2016), Poster Session,

    New York, NY, USA, October 2016. 

  3. Jian Liu, Chen Wang, Yingying Chen,

  4. Poster: PIN Number-based Authentication Leveraging Physical Vibration,

    in Proceedings of the 22nd Annual International Conference on Computing and Networking (MobiCom 2016), Poster Session,

    New York, NY, USA, October 2016. 

  5. Xiaonan Guo, Jian Liu, Yingying Chen,

  6. Poster: Automatic Personal Fitness Assistance through Wearable Mobile Devices,

    in Proceedings of the 22nd Annual International Conference on Computing and Networking (MobiCom 2016), Poster Session,

    New York, NY, USA, October 2016. 

  7. Jian Liu, Yingying Chen, Marco Gruteser,

  8. Demo: VibKeyboard: Virtual Keyboard Leveraging Physical Vibration,

    in Proceedings of the 22nd Annual International Conference on Computing and Networking (MobiCom 2016), Demo Session,

    New York, NY, USA, October 2016. 

  9. Luyang Liu, Cagdas Karatas, Hongyu Li, Sheng Tan, Marco Gruteser, Jie Yang, Yingying Chen, Richard P. Martin

  10. Toward Detection of Unsafe Driving with Wearables,

    in Proceedings of the 1st ACM Workshop on Wearable Systems and Applications at MobiSys (WearSys 2015),

    Florence, Italy, 2015. 

  11. Shubham Jain, Carlo Borgiattino, Yanzhi Ren, Marco Gruteser, Yingying Chen,

  12. On the Limits of Positioning-based Pedestrian Risk Awareness,

    in Proceedings of Workshop on Mobile Augmented Reality and Robotic Technology-based Systems (MARS) at Mobisys,

    Bretton Woods, New Hampshire, June, 2014. 

  13. Yan Wang, Yingying Chen, Fan Ye, Jie Yang, Hongbo Liu,

  14. A Study of Smartphone User Privacy from the Advertiser's Perspective,

    35th IEEE Symposium on Security and Privacy (IEEE S&P), Poster Session,

    San Jose, CA, May, 2014. 

  15. Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, Richard P. Martin,

  16. Measuring Human Queues Using WiFi Signals,

    in Proceedings of ACM Conference on Mobile Computing and Networking (ACM MobiCom), Pages 235-238, Poster Session,

    Miami, Florida, 2013. 

    - Winner of Student Research Competition

  17. Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen,

  18. Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording,

    in Proceedings of the First International Workshop on Data Security and PrivAcy in wireless Networks (IEEE D-SPAN), held in conjunction with WoWMoM,

    page(s): 1-6, Montreal, QC, Canada, June 2010. 

  19. Hongbo Liu, Hui Wang, Yingying Chen,

  20. Coping with Frequency-based Attacks to Secure Distributed Data Storage in Wireless Networks,

    the ACM Conference on Wireless Network Security (WiSec), Poster Session,

    Hoboken, NJ, March 2010.

  21. Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen,

  22. Discovering Wormhole Attacks in Delay Tolerant Networks via Forbidden Topology Structure Identification,

    the ACM Conference on Wireless Network Security (WiSec), Poster Session,

    Hoboken, NJ, March 2010.

  23. Hongbo Liu, Wenyuan Xu, Yingying Chen, Zhenhua Liu,  

  24. Localizing Jammers in Wireless Networks,

    in Proceedings of the IEEE International Workshop on Pervasive Wireless Networking (IEEE PWN), held in conjunction with IEEE PerCom,

    page(s): 1-6, Galveston, Texas, March 2009.

  25. Jie Yang, Yingying Chen, Wade Trappe,

  26. Detecting Sybil Attacks in Wireless and Sensor Networks Using Cluster Analysis,

    in Proceedings of the Fourth IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS), held in conjunction with IEEE MASS 2008,

    page(s): 834-839, Atlanta, GA, September 2008.

  27. Jie Yang, Yingying Chen,

  28. A Theoretical Analysis of Wireless Localization Using RF-based Fingerprint Matching,

    in Proceedings of the Fourth International Workshop on System Management Techniques, Processes, and Services (IEEE SMTPS), held in conjunction with IEEE IPDPS,

    page(s): 1-6, Miami, Fl, USA, April 2008.

  29. Shu Chen, Yingying Chen, Wade Trappe,

  30. "Exploiting Environmental Properties for Wireless Localization,"

    the Thirteenth Annual International Conference on Mobile Computing and Networking (ACM MobiCom), Poster Session,

    Montreal, Canada, September 2007.

  31. Yingying Chen, Eiman Elnahraway, John-Austin Francisco, Konstantinos Kleisouris, Xiaoyan Li, Hongyi Xue, Richard P. Martin,

  32. GRAIL: General Realtime Adaptable Indoor Localization,

    in Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (ACM SenSys), System Demo,

    page(s): 351-352, Boulder, Colorado, USA, November 2006.

  33. John-Austin Francisco, Yingying Chen, Eiman Elnahraway, Konstantinos Kleisouris, Richard P. Martin,

  34. RTBP: Real Time Bayesian Positioning System for Wireless and Sensor Networks,

    the third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2006), System Demo,

    Reston, VA, USA, September 2006.

  35. John-Austin Francisco, Yingying Chen, Eiman Elnahraway, Konstantinos Kleisouris, Richard P. Martin,

  36. Real-Time Bayesian Positioning,

    the third International TinyOS Technology Exchange, System Demo and Poster

    Stanford University, CA, USA, February 2006.

    - Best Technological Innovation Award

  37. Yingying Chen, Constantin Serban, Wenxuan Zhang, Naftaly Minsky,

  38. Towards Decentralized and Secure Electronic Marketplace,

    the DIMACS Workshop on Security of Web Services & E-Commerce (SWSEC),

    Piscataway, NJ, USA, May 2005.

Patents

  1. Vital signs monitoring using WiFi,

  2. Yingying Chen, Jian Liu, Yan Wang, Jie Yang, Jerry Cheng,

     SIT-62/180,696

  3. Device-free activity identification using fine-grained WiFi signatures,

  4. Yingying Chen, Jie Yang, Yan Wang, Jian Liu, Marco Gruteser,

     US 2016/0277529

  5. Method to detecting driver phone use exploiting inertial sensors in smartphones,

  6. Marco Gruteser, Richard P. Martin, Yingying Chen, Yan Wang,

     RU-62/017,217

  7. Systems and methods for detecting driver phone use leveraging car speakers,

  8. Marco Gruteser, Richard P. Martin, Yingying Chen, Jie Yang,

     US Patent App. 13/912,880, 2013

  9. Method and apparatus for improved secure computing and communications,

  10. Joseph Mitola III, Yudong Yao, Yingying Chen, Hong Man,

     US Patent App. 13/298,781, 2011

Technical Reports

  1. Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, Can Emre Koksal,

  2. Collaborative Group Key Extraction Leveraging Received Signal Strength in Real Mobile Environments,

     Technical Report, ECE Department, Stevens Institute of Technology, 2012

  3. Yanzhi Ren, Yingying Chen, Mooi Choo Chuah,

  4. Social Closeness Based Clone Attack Detection for Mobile Healthcare System,

     Technical Report, ECE Department, Stevens Institute of Technology, 2011

  5. Yanzhi Ren, Jie Yang, Mooi Choo Chuah, Yingying Chen,

  6. Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare,

     Technical Report, ECE Department, Stevens Institute of Technology, 2010