Publications

 

Go back to Yingying's Home


Books

Yingying Chen, Wenyuan Xu, Wade Trappe, Yanyong Zhang, Securing Emerging Wireless Systems,
ISBN:978-0-387-88490-5, Springer, 2009.
   
Jie Yang, Yingying Chen, Wade Trappe, and Jerry Cheng, Pervasive Wireless Environments: Detecting and Localizing User Spoofing,
ISBN: 978-3-319-07355-2, Springer, 2014.
   
Jiadi Yu, Yingying Chen, and Xiangyu Xu, Sensing Vehicle Conditions for Detecting Driving Behaviors,
ISBN: 978-3-319-89769-1, Springer, 2018.

Book Chapters

  1. Hongbo Liu, Yan Wang, Jian Liu, Yingying Chen, "Proactive User Authentication Using WiFi Signals in Dynamic Networks", Proactive and Dynamic Network Defense, Cliff Wang and Zhuo Lu (Eds.), Springer, 2019.

  2. Yingying Chen and Jie Yang, "Defending against Identity-Based Attacks in Wireless Networks", Securing Cyber-Physical Infrastructures: Foundations and Challenges, Sajal Das, Krishna Kant and Nan Zhang (eds.), Morgan Kaufmann, 2012.

  3. Jie Yang, Yingying Chen, Richard P. Martin, Wade Trappe and Marco Gruteser, "On the Performance of Wireless Indoor Localization Using Received Signal Strength", Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE, chapter 12, 2011.

  4. Yingying Chen, Jie Yang, Wade Trappe and Richard P. Martin, "Impact of Anchor Placement and Anchor Selection on Localization Accuracy", Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE, chapter 13, 2011.

Journal Papers & Magazine Articles

  1. Xiangyu Xu, Jiadi Yu, Yingying Chen,

  2. Leveraging Acoustic Signals for Fine-grained Breathing Monitoring in Driving Environments,

    IEEE Transactions on Mobile Computing (IEEE TMC), 2020. (To appear)

  3. Yang Bai, Li Lu, Jerry Cheng, Jian Liu, Yingying Chen, Jiadi Yu,

  4. Acoustic-based Sensing and Applications: a Survey,

    Computer Networks, 2020. (To appear)

  5. Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Feilong Tang,

  6. Continuous Authentication through Finger Gesture Interaction for Smart Homes Using WiFi,

    IEEE Transactions on Mobile Computing (IEEE TMC), 2020. (To appear)

  7. Li Lu, Jiadi Yu, Yingying Chen, Yan Wang, Yanmin Zhu,

  8. VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones,

    PACM on Interactive, Mobile, Wearable, and Ubiquitous Computing (IMWUT), 2020. (To present at UbiComp 2020).

  9. Zhe Wang, Yifeng Cao, Linghe Kong, Guihai Chen, Jiadi Yu, Shaojie Tang, Yingying Chen,

  10. Reference Waveforms Forward Concurrent Transmissions in ZigBee Communications,

    IEEE/ACM Transactions on Networking (IEEE/ACM ToN), 2020. (To appear)

  11. Xiaonan Guo, Jian Liu, Yingying Chen,

  12. When Your Wearables Become Your Fitness Mate,

    Smart Health, 2020. (To appear)

  13. Chen Wang, Yan Wang, Yingying Chen, Hongbo Liu, Jian Liu,

  14. User Authentication on Mobile Devices: Approaches, Threats and Trends,

    Computer Networks, 2020. (To appear)

  15. Jian Liu, Hongbo Liu, Yingying Chen, Yan Wang, Chen Wang,

  16. Wireless Sensing for Human Activity: A Survey,

    IEEE Communications Surveys and Tutorials, 2019. (To appear)

  17. Tianming Zhao, Jian Liu, Yan Wang, Hongbo Liu, Yingying Chen,

  18. Towards Low-cost Sign Language Gesture Recognition Leveraging Wearables,

    IEEE Transactions on Mobile Computing (IEEE TMC), 2019. (To appear)

  19. Jiadi Yu, Li Lu, Yingying Chen, Yanmin Zhu,

  20. An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing,

    IEEE Transactions on Mobile Computing (IEEE TMC), 2019. (To appear)

  21. Chuyu Wang, Lei Xie, Wei Wang, Yingying Chen, Tao Xue, Sanglu Lu,

  22. Probing into the Physical Layer: Moving Tag Detection for Large-Scale RFID Systems,

    IEEE Transactions on Mobile Computing (IEEE TMC), 2019. (To appear)

  23. Jiadi Yu, Xiangyu Xu, Yingying Chen, Yanmin Zhu, Minglu Li,

  24. Leveraging Acoustic Signals for Vehicle Steering Tracking with Smartphones,

    IEEE Transactions on Mobile Computing (IEEE TMC), 2019. (To appear)

  25. Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, Jie Yang,

  26. Signature Verification Using Critical Segments for Securing Mobile Transactions,

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 19, Issue 3, Pages 724 - 739, 2020.

  27. Chenxi Yang, Yudi Dong, Yingying Chen, Negar Tavassolian,

  28. A Smartphone-only Pulse Transit Time Monitor Based on Cardio-mechanical and Photoplethysmography Modalities,

    IEEE Transactions on Biomedical Circuits and Systems (IEEE TBioCAS), Volume 13, Issue 6, Pages 1462 - 1470, 2019.

  29. Yanzhi Ren, Chen Wang, Yingying Chen, Jie Yang, Hongwei Li,

  30. Non-invasive Fine-grained Sleep Monitoring Leveraging Smartphones,

    IEEE Internet of Things Journal (IEEE IoT), Volume 6, Issue 5, Pages 8248 - 8261, 2019.

  31. Li Lu, Jiadi Yu, Yingying Chen, Hongbo Liu, Yanmin Zhu, Linghe Kong, Minglu Li,

  32. Lip Reading-based User Authentication through Acoustic Sensing on Smartphones,

    IEEE/ACM Transactions on Networking (IEEE/ACM ToN), Volume 27, Issue 1, Pages 447 - 460, 2019.

  33. Yan Wang, Yingying Chen, Fan Ye, Hongbo Liu, Jie Yang,

  34. Implications of Smartphone User Privacy Leakage from the Advertiser's Perspective,

    Pervasive and Mobile Computing, Volume 53, Pages 13-32, 2019.

  35. Xiaonan Guo, Jian Liu, Cong Shi, Hongbo Liu, Yingying Chen, Mooi Choo Chuah,

  36. Device-free Personalized Fitness Assistant Using WiFi, [pdf], [BibTex], [Google Scholar]

    PACM on Interactive, Mobile, Wearable, and Ubiquitous Computing (IMWUT), Volume 2, Issue 4, No. 165, 2018. (To present at UbiComp 2019).

  37. Chuyu Wang, Lei Xie, Wei Wang, Yingying Chen, Yanling Bu, Sanglu Lu,

  38. RF-ECG: Heart Rate Variability Assessment Based on COTS RFID Tag Array, [pdf], [BibTex], [Google Scholar]

    PACM on Interactive, Mobile, Wearable, and Ubiquitous Computing (IMWUT), Volume 2, Issue 2, No. 85, 2018. (To present at UbiComp 2018).

  39. Jian Liu, Yingying Chen, Yan Wang, Xu Chen, Jerry Cheng, Jie Yang,

  40. Monitoring Vital Signs and Postures During Sleep Using WiFi Signals, [pdf], [BibTex], [Google Scholar]

    IEEE Internet of Things Journal (IEEE IoT), Volume 5, Issue 3, Pages 2071-2084, 2018.

  41. Chao Jiang, Muhammad Fahad, Yi Guo, Yingying Chen,

  42. Robot-Assisted Smartphone Localization for Human Indoor Tracking, [pdf], [BibTex], [Google Scholar]

    Robotics and Autonomous Systems, Volume 106, Pages 82-94, 2018.

  43. Chuyu Wang, Jian Liu, Yingying Chen, Lei Xie, Hongbo Liu, Sanglu Lu,

  44. RF-Kinect: A Wearable RFID-based Approach Towards 3D Body Movement Tracking, [pdf], [BibTex], [Google Scholar]

    PACM on Interactive, Mobile, Wearable, and Ubiquitous Computing (IMWUT), Volume 2, Issue 1, No. 41, 2018. (To present at UbiComp 2018).

  45. Chen Wang, Xiaonan Guo, Yingying Chen, Yan Wang, Bo Liu,

  46. Personal PIN Leakage from Wearable Devices, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 17, Issue 3, Pages 646-660, 2018.

  47. Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen, H. Vincent Poor,

  48. Authenticating Users through Fine-grained Channel Information, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 17, Issue 2, Pages 251-264, 2018.

  49. Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena,

  50. Good Vibrations: Accessing 'Smart' Systems by Touching Any Solid Surface, [pdf], [BibTex], [Google Scholar]

    Biometric Technology Today, Issue 4, Pages 7-10, 2018. 

  51. Chen Wang, Xiuyuan Zheng, Yingying Chen, Jie Yang,

  52. Locating Rogue Access Point using Fine-grained Channel Information, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 16, Issue 9, Pages 2560-2573, 2017.

  53. Hongbo Liu, Yingying Chen, Mooi Choo Chuah, Jie Yang, H. Vincent Poor,

  54. Enabling Self-healing Smart Grid Through Jamming Resilient Local Controller Switching, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Volume 14, Issue 4, Pages 377-391, 2017.

  55. Jiadi Yu, Zhongyang Chen, Yanmin Zhu, Yingying Chen, Linghe Kong, Minglu Li,

  56. Fine-grained Abnormal Driving Behaviors Detection and Identification with Smartphones, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 8, Pages 2198-2212, 2017.

    - Featured in IEEE Xplore Innovation Spotlight.

  57. Yan Wang, Yingying Chen, Jie Yang, Luyang Liu, Marco Gruteser, Richard P. Martin, Hongbo Liu,

  58. Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 8, Pages 1965-1981, 2016.

  59. Wen Ji, Yingying Chen, Bo-Wei Chen, Yiqiang Chen, Sun-Yuan Kung,

  60. Profit Maximization through Online Advertising Scheduling for a Wireless Video Broadcast Network, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 8, Pages 2064-2079, 2016.

  61. Jiadi Yu, Haofu Han, Hongzi Zhu, Yingying Chen, Jie Yang, Yanmin Zhu, Guangtao Xue and Minglu Li,

  62. SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 1, Pages 202-216, 2016.

  63. Tao Shu, Yingying Chen, Jie Yang,

  64. Protecting Multi-Lateral Localization Privacy in Pervasive Environments, [pdf], [BibTex], [Google Scholar]

    IEEE/ACM Transactions on Networking (IEEE/ACM ToN), Volume 23, Issue 5, Pages 1688-1701, 2015.

  65. Xin Dong, Jiadi Yu, Yanmin Zhu, Yingying Chen, Yuan Luo, and Minglu Li,

  66. SECO: Secure and Scalable Data Collaboration Services in Cloud Computing, [pdf], [BibTex], [Google Scholar]

    Computers & Security, Volume 50, Issue 9, Pages 91-105, 2015.

  67. Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, and Jie Yang,

  68. User Verification Leveraging Gait Recognition For Smartphone Enabled Mobile Healthcare Systems, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 14, Issue 9, Pages 1961-1974, 2015.

  69. Xiuyuan Zheng, Jie Yang, Yingying Chen, and Hui Xiong,

  70. An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 14, Issue 6, Pages 1138-1150, 2015.

  71. Jiadi Yu, Haofu Han, Hongzi Zhu, Yingying Chen, Jie Yang, Yanmin Zhu, Guangtao Xue, and Minglu Li,

  72. Sensing Human-Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 14, Issue 8, Pages 1698-1711, 2015.

  73. Yanzhi Ren, Jie Yang, Mooi Choo Chuah, and Yingying Chen,

  74. Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones, [pdf], [BibTex], [Google Scholar]

    Ad Hoc & Sensor Wireless Networks (AHSWN), Volume 27, No. 1-2, Pages 51-73, 2015.

  75. Wenlin Zhang, Yi Guo, Hongbo Liu, Yingying Chen, Zheng Wang, and Joseph Mitola III,

  76. Distributed Consensus-based Weight Design for Cooperative Spectrum Sensing, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 26, Issue 1, Pages 54-64, 2014.

  77. Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, and C. Emre Koksal,

  78. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 13, Issue 12, Pages 2820-2835, 2014.

  79. Hongbo Liu, Jie Yang, Simon Sidhom, Yan Wang, Yingying Chen, Fan Ye,

  80. Accurate WiFi Based Localization for Smartphones Using Peer Assistance, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), 2014, Volume 13, No.10, Pages 2199 - 2214, 2014.

  81. Xiuyuan Zheng, Hongbo Liu, Jie Yang, Yingying Chen, Richard P. Martin, and Xiaoyan Li, [pdf], [BibTex], [Google Scholar]

  82. A Study of Localization Accuracy using Multiple Frequencies and Powers,

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 25, Issue 8, Pages 1955-1965, 2014.

  83. Hongbo Liu, Hui Wang, and Yingying Chen,

  84. Defending against Frequency-based Attacks on Distributed Data Storage in Wireless Networks, [pdf], [BibTex], [Google Scholar]

    ACM Transactions on Sensor Networks (ACM TOSN), Volume 10, Issue 3, Pages 49:1-49:37 2014.

  85. Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, Minglu Li,

  86. Achieving an Effective, Scalable and Privacy-preserving Data Sharing Service in Cloud Computing, [pdf], [BibTex], [Google Scholar]

    Computers & Security, Volume 42, Pages 151-164, 2014.

  87. Yan Wang, Mooi Choo Chuah and Yingying Chen,

  88. Incentive Based Data Sharing in Delay Tolerant Mobile Networks, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Wireless Communications (IEEE TWC), Volume.3, No.1, Pages.370-381, 2014.

  89. Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen,

  90. An Error Minimizing Framework for Localizing Jammers in Wireless Networks, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume.25, No.2, Pages.508-517, 2014.

  91. Joseph Mitola III, Joseph Guerci, Jeff Reed, Yu-Dong Yao, Yingying Chen, T. Charles Clancy, Johanna Dwyer, Hongbin Li, Hong Man, Robert McGwier, and Yi Guo

  92. Accelerating 5G QoE via Public-Private Spectrum Sharing, [pdf], [BibTex], [Google Scholar]

    IEEE Communications Magazine, Volume 52, No. 5, Pages 77-85, May 2014. 

  93. Yan Wang, Yingying Chen, and Richard P. Martin

  94. Leveraging Wi-Fi Signals to Monitor Human Queues, [pdf], [BibTex], [Google Scholar]

    IEEE Pervasive Computing Magazine, Volume 13, No. 2, Pages 14-17, April-June 2014. 

  95. Jie Yang, Yingying Chen, Wade Trappe, and Jerry Cheng,

  96. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 24, No.1, Pages 44-58, 2013.

  97. Guoru Ding, Jinlong Wang, Qihui Wu, Fei Song,and Yingying Chen,

  98. Spectrum Sensing in Opportunity-Heterogeneous Cognitive Sensor Networks: How to Cooperate?, [pdf], [BibTex], [Google Scholar]

    IEEE Sensors Journal, Volume 13, No. 11, Pages. 4247-4255, November. 2013.

  99. Xiuyuan Zheng, Yingying Chen, Hui Wang, Hongbo Liu, Ruilin Liu,

  100. Neighborhood Prediction Based Decentralized Key Management for Mobile Wireless Networks, [pdf], [BibTex], [Google Scholar]

    Springer Wireless Networks (WiNET), the Journal of Mobile Communication, Computation and Information, Volume 19, Issue 6, pp 1387-1406, August 2013.

  101. Guoru Ding, Qihui Wu, Yu-Dong Yao, Jinlong Wang, and Yingying Chen,

  102. Kernel-based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions, [pdf], [BibTex], [Google Scholar]

    IEEE Signal Processing Magazine, Volume 30, No. 4, Pages 126-136, July 2013. (Top 25 most frequency downloaded documents in June 2013 and July 2013 [link])

  103. Jie Yang, Simon Sidhom, Gayathri Chandrasekaran, Tam Vu, Hongbo Liu, Nicolae Cecan, Yingying Chen, Marco Gruteser, Richard P. Martin,

  104. Sensing Driver Phone Use with Acoustic Ranging Through Car Speakers, Editorial Notes, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume11, No.9, Pages 1426-1440, 2012.

  105. Xiaoyan Li, Yingying Chen, Jie Yang, and Xiuyuan Zheng,

  106. Achieving Robust Wireless Localization Resilient to Signal Strength Attacks, [pdf], [BibTex], [Google Scholar]

    Springer Wireless Networks (WiNET), the Journal of Mobile Communication, Computation and Information, Volume 18, Issue 1, Pages 45-58, 2012.

  107. Jie Yang and Yingying Chen,

  108. Towards Attack Resistant Localization under Infrastructure Attacks, [pdf], [BibTex], [Google Scholar]

    Security and Communication Networks (SCN), Wiley, Volume 5, Issue 4, Pages 384-403, 2012.

  109. Song Liu, Larry J. Greenstein, Wade Trappe, Yingying Chen,

  110. Detecting Anomalous Spectrum Usage in Dynamic Spectrum Access Networks, [pdf], [BibTex], [Google Scholar]

    Ad Hoc Networks, Special Issue on Cognitive Radio Ad Hoc Networks, Volume 10, Issue 5, Pages 831-844, 2012.

  111. Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen,

  112. Exploiting Jamming-Caused Neighbor Changes for Jammer Localization, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 23, Issue 3, Pages 547-555, 2012.

  113. Ruilin Liu, Xiuyuan Zheng, Hongbo Liu, Hui(Wendy) Wang, Yingying Chen,

  114. Metadata-guided Evaluation of Resource-constrained Queries in Content Caching Based Wireless Networks, [pdf], [BibTex], [Google Scholar]

    Springer Wireless Networks (WiNET), the Journal of Mobile Communication, Computation and Information, Volume 17, Issue 8, Pages 1833-1850, 2011.

  115. Jie Yang, Yingying Chen, Jerry Cheng,

  116. Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments,

    Ad Hoc & Sensor Wireless Networks (AHSWN), Volume 11 , No.3-4 , Pages 307-329, 2011.

  117. Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu,

  118. Determining the Position of a Jammer Using a Virtual-Force Iterative Approach, [pdf], [BibTex], [Google Scholar]

    Springer Wireless Networks (WiNET), the Journal of Mobile Communication, Computation and Information, Volume 16, Pages 1-17, October 2010.

  119. Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen,

  120. Detecting Wormhole Attacks in Delay Tolerant Networks, [pdf], [BibTex], [Google Scholar]

    in IEEE Wireless Communications Magazine (IEEE WCM), special issue on Security & Privacy, Volume.17, No. 5, Pages 36-42, October 2010. (Acceptance ratio: 17.9%)

  121. Jie Yang, Yanzhi Ren, Yingying Chen and Mooi Choo Chuah,

  122. A Social Community Based Approach for Reducing the Propagation of Infectious Diseases in Healthcare, [pdf], [BibTex], [Google Scholar]

    ACM SIGMOBILE Mobile Computing and Communications Review (ACM MC2R), 2010.

  123. Yingying Chen , Hui Wang, Xiuyuan Zheng, and Jie Yang,

  124. A Reinforcement Learning-Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks, [pdf], [BibTex], [Google Scholar]

    in EURASIP Journal on Wireless Communications and Networking (EURASIP JWCN), vol. 2010, Article ID 319275, June 2010.

  125. Yingying Chen, Jie Yang, Wade Trappe, Richard P. Martin,

  126. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Vehicular Technology (IEEE TVT), Volume 59, Issue5, pp. 2418 - 2434, June 2010.

  127. Konstantinos Kleisouris, Yingying Chen, Jie Yang, Richard P. Martin,

  128. Performance Analysis of Wireless Localization When Using Multiple Antennas,

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), November 2010.

  129. Shu Chen, Yingying Chen, Wade Trappe,

  130. Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), Volume 21, Issue 5, Pages 722 - 736, 2010.

  131. Gayathri Chandrasekaran, Mesut Ergin, Marco Gruteser, Rich Martin, Jie Yang, Yingying Chen,

  132. DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices, [pdf], [BibTex], [Google Scholar]

    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 8, Number 12, December 2009.

  133. Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin,

  134. A Security and Robustness Performance Analysis of Localization Algorithms to Signal Strength Attacks, [pdf], [BibTex], [Google Scholar]

    ACM Transactions on Sensor Networks (ACM TOSN), Volume 5, Issue 1, February 2009.

  135. Shu Chen, Yingying Chen, Wade Trappe,

  136. Exploiting Environmental Properties for Wireless Localization, [pdf], [BibTex], [Google Scholar]

    ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Volume 12, Issue 1, Pages 49-51, 2008.

  137. Yingying Chen, Gayathri Chandrasekaran, Eiman Elnahrawy, John-Austen Francisco, Konstantinos Kleisouris, Xiaoyan Li, Richard P. Martin, Robert S. Moore, Begumhan Turgut,

  138. GRAIL: A General Purpose Localization System, [pdf], [BibTex], [Google Scholar]

    Sensor Review, special edition, Localization Systems, Vol. 28, No. 2, pp.115-124, 2008.

  139. Constantin Serban, Yingying Chen, Wenxuan Zhang, and Naftaly Minsky,

  140. The concepts of Decentralized and Secure Electronic Marketplace, [pdf], [BibTex], [Google Scholar]

    Electronic Commerce Research (ECR) Journal, Volume 8, Issue 1-2, Pages 79-101, 2008.