Yingying Chen
#152,007
Most Influential Person Now
Computer scientist
Yingying Chen's AcademicInfluence.com Rankings
Yingying Chencomputer-science Degrees
Computer Science
#8102
World Rank
#8523
Historical Rank
Machine Learning
#3309
World Rank
#3348
Historical Rank
Artificial Intelligence
#3611
World Rank
#3662
Historical Rank
Database
#5254
World Rank
#5454
Historical Rank
Download Badge
Computer Science
Yingying Chen's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Yingying Chen Influential?
(Suggest an Edit or Addition)According to Wikipedia, Yingying Chen is a computer scientist whose research involves mobile computing, the internet of things, the security implications of mobile sensor data, wearable technology, and activity trackers. She is a professor at Rutgers University, where she heads the Department of Electrical and Computer Engineering and directs the Data Analysis and Information SecuritY Lab.
Yingying Chen's Published Works
Published Works
- E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures (2014) (736)
- Push the limit of WiFi based localization for smartphones (2012) (431)
- Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi (2015) (382)
- Detecting and Localizing Wireless Spoofing Attacks (2007) (286)
- Detecting driver phone use leveraging car speakers (2011) (236)
- Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks (2010) (209)
- A Practical Approach to Landmark Deployment for Indoor Localization (2006) (208)
- Fast and practical secret key extraction by exploiting channel response (2013) (198)
- Indoor Localization Using Improved RSS-Based Lateration Methods (2009) (189)
- Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT (2017) (184)
- Sensing vehicle dynamics for determining driver phone use (2013) (178)
- Kernel-Based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions (2013) (173)
- Accurate WiFi Based Localization for Smartphones Using Peer Assistance (2014) (148)
- Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks (2012) (136)
- VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones (2016) (136)
- Snooping Keystrokes with mm-level Audio Ranging on a Single Phone (2015) (133)
- Wireless Sensing for Human Activity: A Survey (2020) (126)
- Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN (2016) (124)
- SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments (2014) (117)
- Detecting Spoofing Attacks in Mobile Wireless Environments (2009) (111)
- Monitoring Vital Signs and Postures During Sleep Using WiFi Signals (2018) (109)
- Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing (2014) (103)
- Fine-grained sleep monitoring: Hearing your breathing with smartphones (2015) (101)
- Fine-Grained Abnormal Driving Behaviors Detection and Identification with Smartphones (2017) (99)
- Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation (2014) (99)
- Accelerating 5G QoE via public-private spectrum sharing (2014) (97)
- Attack Detection in Wireless Localization (2007) (92)
- User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems (2015) (90)
- Empirical Evaluation of the Limits on Localization Using Signal Strength (2009) (89)
- Tracking human queues using single-point signal monitoring (2014) (87)
- ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks (2009) (86)
- D3: Abnormal driving behaviors detection and identification using smartphone sensors (2015) (81)
- The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study (2006) (80)
- LookUp: Enabling Pedestrian Safety Services via Shoe Sensing (2015) (76)
- Smartphone based user verification leveraging gait recognition for mobile healthcare systems (2013) (75)
- Localizing jammers in wireless networks (2009) (75)
- VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration (2017) (74)
- Practical user authentication leveraging channel state information (CSI) (2014) (73)
- Multi - Touch in the Air: Device-Free Finger Tracking and Gesture Recognition via COTS RFID (2018) (71)
- Exploiting Jamming-Caused Neighbor Changes for Jammer Localization (2012) (70)
- Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments (2010) (69)
- Tracking vehicular speed variations by warping mobile phone signal strengths (2011) (69)
- Accuracy characterization of cell tower localization (2010) (67)
- FitCoach: Virtual fitness coach empowered by wearable mobile devices (2017) (63)
- BreathListener: Fine-grained Breathing Monitoring in Driving Environments Utilizing Acoustic Signals (2019) (61)
- Toward Detection of Unsafe Driving with Wearables (2015) (60)
- Real-Time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems (2020) (59)
- Authenticating Users Through Fine-Grained Channel Information (2018) (57)
- Vehicular speed estimation using received signal strength from mobile phones (2010) (56)
- Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones (2019) (55)
- Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks] (2010) (55)
- A theoretical analysis of wireless localization using RF-based fingerprint matching (2008) (54)
- MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks (2010) (54)
- An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing (2021) (53)
- AdvPulse: Universal, Synchronization-free, and Targeted Audio Adversarial Attacks via Subsecond Perturbations (2020) (53)
- Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi (2021) (53)
- LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals (2018) (53)
- Distributed Cooperative Spectrum Sensing Based on Weighted Average Consensus (2011) (52)
- Distributed Consensus-Based Weight Design for Cooperative Spectrum Sensing (2015) (51)
- Determining the position of a jammer using a virtual-force iterative approach (2011) (51)
- Leveraging wearables for steering and driver tracking (2016) (49)
- Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors (2016) (46)
- A Study of Localization Accuracy Using Multiple Frequencies and Powers (2014) (46)
- WiFi-Enabled Smart Human Dynamics Monitoring (2017) (45)
- Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks (2009) (43)
- Practical Adversarial Attacks Against Speaker Recognition Systems (2020) (43)
- Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording (2010) (43)
- Multi-lateral privacy-preserving localization in pervasive environments (2014) (42)
- Device-free Personalized Fitness Assistant Using WiFi (2018) (41)
- Detection and Localization of Multiple Spoofing Attackers in Wireless Networks (2013) (40)
- Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges (2010) (40)
- Sensing Driver Phone Use with Acoustic Ranging through Car Speakers (2012) (40)
- Detecting sybil attacks inwireless and sensor networks using cluster analysis (2008) (40)
- FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi (2019) (40)
- User authentication on mobile devices: Approaches, threats and trends (2020) (40)
- Incentive Based Data Sharing in Delay Tolerant Mobile Networks (2014) (39)
- Measuring human queues using WiFi signals (2013) (39)
- Towards In-baggage Suspicious Object Detection Using Commodity WiFi (2018) (39)
- MU-ID: Multi-user Identification Through Gaits Using Millimeter Wave Radios (2020) (38)
- Localizing Multiple Jamming Attackers in Wireless Networks (2011) (37)
- An Error-Minimizing Framework for Localizing Jammers in Wireless Networks (2014) (36)
- E3: energy-efficient engine for frame rate adaptation on smartphones (2013) (36)
- The Impact of Using Multiple Antennas on Wireless Localization (2008) (34)
- Locating Rogue Access Point Using Fine-Grained Channel Information (2017) (34)
- The concept of decentralized and secure electronic marketplace (2008) (34)
- ER: Early recognition of inattentive driving leveraging audio devices on smartphones (2017) (33)
- A security and robustness performance analysis of localization algorithms to signal strength attacks (2009) (32)
- Securing Emerging Wireless Systems - Lower-layer Approaches (2008) (32)
- VibSense: Sensing Touches on Ubiquitous Surfaces through Vibration (2017) (31)
- On the limits of positioning-based pedestrian risk awareness (2014) (30)
- BigRoad: Scaling Road Data Acquisition for Dependable Self-Driving (2017) (30)
- RF-ECG (2018) (30)
- Non-interactive localization of cognitive radios based on dynamic signal strength mapping (2009) (29)
- Enabling Fast and Universal Audio Adversarial Attack Using Generative Model (2020) (28)
- Sensing Human-Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones (2015) (28)
- PPG-based Finger-level Gesture Recognition Leveraging Wearables (2018) (28)
- Winect: 3D Human Pose Tracking for Free-form Activity Using Commodity WiFi (2021) (27)
- Uber-in-light: Unobtrusive visible light communication leveraging complementary color channel (2016) (27)
- TrueHeart: Continuous Authentication on Wrist-worn Wearables Using PPG-based Biometrics (2020) (26)
- KeyLiSterber: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals (2019) (26)
- Detecting anomalous spectrum usage in dynamic spectrum access networks (2012) (26)
- SECO: Secure and scalable data collaboration services in cloud computing (2015) (25)
- Leveraging Audio Signals for Early Recognition of Inattentive Driving with Smartphones (2018) (24)
- Empirical Evaluation of Wireless Localization when Using Multiple Antennas (2010) (24)
- Detection of On-Road Vehicles Emanating GPS Interference (2014) (23)
- Achieving secure and efficient data collaboration in cloud computing (2013) (23)
- Robust wireless localization to attacks on access points (2009) (23)
- Incentive driven information sharing in delay tolerant mobile networks (2012) (23)
- An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization (2015) (21)
- Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations (2019) (21)
- Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks (2010) (21)
- Protecting Multi-Lateral Localization Privacy in Pervasive Environments (2015) (21)
- Enabling Fine-Grained Finger Gesture Recognition on Commodity WiFi Devices (2022) (20)
- Towards Low-Cost Sign Language Gesture Recognition Leveraging Wearables (2021) (20)
- Acoustic-based sensing and applications: A survey (2020) (19)
- Accurate rogue access point localization leveraging fine-grained channel information (2014) (19)
- Critical segment based real-time E-signature for securing mobile transactions (2015) (19)
- Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing (2014) (19)
- Adaptive device-free passive localization coping with dynamic target speed (2013) (18)
- Designing localization algorithms robust to signal strength attacks (2010) (18)
- Signature Verification Using Critical Segments for Securing Mobile Transactions (2020) (18)
- Continuous User Verification via Respiratory Biometrics (2020) (18)
- GRAIL: a general purpose localization system (2008) (18)
- VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones (2020) (17)
- Personal PIN Leakage from Wearable Devices (2018) (17)
- RF-Kinect (2018) (17)
- DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices (2009) (17)
- Relationship-based Detection of Spoofing-related Anomalous Traffic (2009) (16)
- Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers (2019) (16)
- Social closeness based clone attack detection for mobile healthcare system (2012) (15)
- CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping (2019) (15)
- Exploiting Environmental Properties for Wireless Localization and Location Aware Applications (2008) (15)
- Your Heart Won't Lie: PPG-based Continuous Authentication on Wrist-worn Wearable Devices (2018) (14)
- Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching (2015) (14)
- Error minimizing jammer localization through smart estimation of ambient noise (2012) (14)
- Poster: hearing your breathing: fine-grained sleep monitoring using smartphones (2014) (14)
- Noninvasive Fine-Grained Sleep Monitoring Leveraging Smartphones (2019) (14)
- Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers (2021) (13)
- WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables (2019) (13)
- Achieving robust wireless localization resilient to signal strength attacks (2012) (13)
- SteerTrack: Acoustic-Based Device-Free Steering Tracking Leveraging Smartphones (2018) (12)
- Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments (2011) (11)
- Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare (2011) (11)
- Behavior Recognition Based on Wi-Fi CSI: Part 1 (2017) (11)
- Robot-assisted human indoor localization using the Kinect sensor and smartphones (2014) (11)
- Demo: Hands-Free Human Activity Recognition Using Millimeter-Wave Sensors (2019) (11)
- Robot-assisted smartphone localization for human indoor tracking (2018) (11)
- Towards Understanding the Advertiser's Perspective of Smartphone User Privacy (2015) (11)
- GoPose: 3D Human Pose Estimation Using WiFi (2022) (10)
- GoPose: 3D Human Pose Estimation Using WiFi (2022) (10)
- GRAIL: general real-time adaptable indoor localization (2006) (10)
- DECODE : Detecting co-moving wireless devices (2008) (10)
- WiFi-Enabled User Authentication through Deep Learning in Daily Activities (2021) (10)
- Real-time, Robust and Adaptive Universal Adversarial Attacks Against Speaker Recognition Systems (2021) (10)
- WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi Signals (2020) (9)
- EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech (2021) (9)
- Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points (2017) (9)
- When your wearables become your fitness mate (2020) (9)
- Leveraging Acoustic Signals for Vehicle Steering Tracking with Smartphones (2020) (9)
- Towards self-healing smart grid via intelligent local controller switching under jamming (2013) (9)
- Characterizing the impact of multi-frequency and multi-power on localization accuracy (2010) (9)
- VocalLock (2020) (9)
- Proactive call drop avoidance in UMTS networks (2013) (9)
- Sensing Ambient Light for User Experience-Oriented Color Scheme Adaptation on Smartphone Displays (2015) (8)
- Tracking free-form activity using wifi signals (2021) (8)
- Leveraging Breathing for Continuous User Authentication (2018) (8)
- On the Performance of Wireless Indoor Localization Using Received Signal Strength (2019) (8)
- Simultaneous Monitoring of Multiple People’s Vital Sign Leveraging a Single Phased-MIMO Radar (2021) (8)
- ToothSonic: Earable Authentication via Acoustic Toothprint (2022) (7)
- I3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones (2019) (7)
- A decentralized key management scheme via neighborhood prediction in mobile wireless networks (2010) (7)
- ADLS: Attack Detection for Wireless Localization Using Least Squares (2007) (7)
- Behavior Recognition Based on Wi-Fi CSI: Part 2 (2018) (7)
- WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training (2020) (7)
- Your Phone Tells Us The Truth: Driver Identification Using Smartphone on One Turn (2018) (7)
- ToothSonic: Earable Authentication via Acoustic Toothprint (2022) (7)
- H2K: A Heartbeat-Based Key Generation Framework for ECG and PPG Signals (2021) (7)
- Signal Processing for Smart Vehicle Technologies: Part 2 [From the Guest Editors] (2017) (7)
- Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors (2021) (6)
- Driver Identification Leveraging Single-turn Behaviors via Mobile Devices (2020) (6)
- BreathListener (2019) (6)
- Robust Continuous Authentication Using Cardiac Biometrics From Wrist-Worn Wearables (2022) (6)
- Secret key distribution leveraging color shift over visible light channel (2017) (6)
- Securing Mobile Location-based Services through position verification leveraging key distribution (2012) (6)
- VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals (2018) (6)
- P2E: Privacy-preserving and effective cloud data sharing service (2013) (6)
- Defending Against Identity-Based Attacks in Wireless Networks (2012) (5)
- Towards Environment-independent Behavior-based User Authentication Using WiFi (2020) (5)
- Earable Authentication via Acoustic Toothprint (2021) (5)
- A 2000-year documentary record of levee breaches on the lower Yellow River and their relationship with climate changes and human activities (2020) (5)
- Smart Health mPose : Environment- and subject-agnostic 3D skeleton posture reconstruction leveraging a single mmWave device (2021) (5)
- Invisible and Efficient Backdoor Attacks for Compressed Deep Neural Networks (2022) (5)
- EchoLock: Towards Low-effort Mobile User Identification Leveraging Structure-borne Echos (2020) (5)
- Probing into the Physical Layer: Moving Tag Detection for Large-Scale RFID Systems (2020) (5)
- 3D Human Pose Estimation Using WiFi Signals (2021) (5)
- Implications of smartphone user privacy leakage from the advertiser's perspective (2019) (4)
- Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array (2021) (4)
- I3 (2019) (4)
- WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity (2020) (4)
- Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS) (2016) (4)
- Leveraging Wi-Fi Signals to Monitor Human Queues (2014) (4)
- A Low-cost, Smartphone-only Pulse Transit Time Measurement System Using Cardio-mechanical Signals and Optical Sensors* (2018) (4)
- Environment-independent In-baggage Object Identification Using WiFi Signals (2021) (4)
- Signal Processing for Smart Vehicle Technologies [From the Guest Editors] (2017) (4)
- Color Scheme Adaptation to Enhance User Experience on Smartphone Displays Leveraging Ambient Light (2017) (4)
- Bipartite Graph Matching Based Secret Key Generation (2021) (4)
- Towards safer texting while driving through stop time prediction (2016) (4)
- BatComm: enabling inaudible acoustic communication with high-throughput for mobile devices (2020) (4)
- A social community based approach for reducing the propagation of infectious diseases in healthcare (2010) (4)
- Toward attack-resistant localization under infrastructure attacks (2012) (4)
- TOWARDS A DECENTRALIZED AND SECURE ELECTRONIC MARKETPLACE (2005) (4)
- SalsaAsst: Beat Counting System Empowered by Mobile Devices to Assist Salsa Dancers (2017) (4)
- Semi-black-box Attacks Against Speech Recognition Systems Using Adversarial Samples (2019) (4)
- Leveraging Acoustic Signals for Fine-Grained Breathing Monitoring in Driving Environments (2022) (4)
- Reference Waveforms Forward Concurrent Transmissions in ZigBee Communications (2020) (4)
- A Smartphone-Only Pulse Transit Time Monitor Based on Cardio-Mechanical and Photoplethysmography Modalities (2019) (4)
- TouchPass (2020) (4)
- Breathing Sound-based Exercise Intensity Monitoring via Smartphones (2021) (3)
- Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching (2011) (3)
- Localizing Acoustic Objects on a Single Phone (2021) (3)
- VibKeyboard: virtual keyboard leveraging physical vibration: demo (2016) (3)
- HyperEar: Indoor Remote Object Finding with a Single Phone (2019) (3)
- Secure Coded Computation for Efficient Distributed Learning in Mobile IoT (2021) (3)
- Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks (2011) (3)
- Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing (2021) (3)
- Pervasive Wireless Environments: Detecting and Localizing User Spoofing (2014) (3)
- Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals (2020) (3)
- Neighborhood prediction based decentralized key management for mobile wireless networks (2013) (3)
- Forward the Collision Decomposition in ZigBee (2019) (3)
- Winect (2021) (3)
- A New Architecture for Personalization Engines: An Open Source Approach (2008) (2)
- Mobile Sensing Enabled Robust Detection of Security Threats in Urban Environments (2010) (2)
- MIXP: Efficient Deep Neural Networks Pruning for Further FLOPs Compression via Neuron Bond (2021) (2)
- Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices (2021) (2)
- To Do or Not to Do: Metadata-Guided Query Evaluation in Content Caching Networks (2009) (2)
- A trusted infrastructure for facilitating access control of location information (2008) (2)
- Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications (2010) (2)
- Poster: Inaudible High-throughput Communication Through Acoustic Signals (2019) (2)
- Securing wireless localization against signal strength attacks (2007) (2)
- Jamming Attacks and Radio Interference (2009) (2)
- Extracting jamming signals to locate radio interferers and jammers (2012) (2)
- FingerPass (2019) (2)
- A Low-Cost Wi-Fi-Based Solution for Measuring Human Queues (2015) (2)
- Distributed Cooperative Spectrum Sensing Using Weighted Average Consensus (2012) (2)
- HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks (2021) (2)
- Automatic personal fitness assistance through wearable mobile devices: poster (2016) (2)
- HearHere: smartphone based audio localization using time difference of arrival: demo (2016) (2)
- A Brief Survey of Jamming and Defense Strategies (2009) (2)
- Prediction of near likely nodes in data-centric mobile wireless networks (2009) (2)
- Wi-Fi-Enabled Automatic Eating Moment Monitoring Using Smartphones (2019) (2)
- Demo: Toward Continuous User Authentication Using PPG in Commodity Wrist-worn Wearables (2019) (2)
- Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks (2014) (1)
- Detecting Jamming Attacks and Radio Interference (2009) (1)
- Collaborative Group Key Extraction Leveraging Received Signal Strength in Real Mobile Environments (2012) (1)
- Poster: Inferring Mobile Payment Passcodes Leveraging Wearable Devices. (2018) (1)
- EchoLock: Towards Low Effort Mobile User Identification (2020) (1)
- Demo: Monitoring Movement Dynamics of Robot Cars and Drones Using Smartphone’s Built-in Sensors (2019) (1)
- Using a multiple analytical distribution filter for underwater localization (2009) (1)
- Video: LookUp!: Enabling Pedestrian Safety Services via Shoe Sensing (2015) (1)
- Proactive User Authentication Using WiFi Signals in Dynamic Networks (2019) (1)
- SubTrack: Enabling Real-Time Tracking of Subway Riding on Mobile Devices (2017) (1)
- Overview of Wireless Localization (2009) (1)
- NORM: A Decentralized Location Verification Mechanism for Wireless Sensor Networks (2008) (1)
- Achieving robust wireless localization resilient to signal strength attacks (2011) (1)
- Motion Sensor-based Privacy Attack on Smartphones. (2020) (1)
- Exploiting environmental properties for wireless localization (2008) (1)
- Detection and Localizing Multiple Spoofing Attackers (2014) (1)
- LiveScreen: Video Chat Liveness Detection Leveraging Skin Reflection (2020) (1)
- Enabling Secret Key Distribution Over Screen-to-Camera Channel Leveraging Color Shift Property (2021) (1)
- Sensing on ubiquitous surfaces via vibration signals: poster (2016) (1)
- Passive intrusion detection in wireless networks by exploiting clustering-based learning (2010) (1)
- Detecting and LocalizingWirelessSpoofingAttacks (2007) (1)
- Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors (2020) (1)
- GRAIL: A General Purpose Real Time Localization System: Version 1.0 (2009) (0)
- Controller Manager - Technical Report (0)
- Sensing Vehicle Dynamics for Abnormal Driving Detection (2018) (0)
- GRAIL: A General Purpose Real Time Localization System: Version 1.0 (2009) (0)
- S ECURITY A ND P RIVACY I N E MERGING W IRELESS N ETWORKS (2010) (0)
- PIN number-based authentication leveraging physical vibration: poster (2016) (0)
- m <sup>3</sup> Track (2022) (0)
- Research on Blind Estimation Method of Low SNR Long Pseudo Code Direct Spread Signal (2019) (0)
- MultiAuth (2021) (0)
- RTBP : Real Time Bayesian Positioning System for Wireless and Sensor Networks (2006) (0)
- Good vibrations: accessing ‘smart’ systems by touching any solid surface (2018) (0)
- Statistical learning and data mining in biological databases (2009) (0)
- Channel Surfing: Defending Wireless Networks against Radio Interference (2009) (0)
- Sensing Vehicle Dynamics with Smartphones (2018) (0)
- HARNESSING ADVERSARIAL SAMPLES AGAINST VOICE ASSISTANTS (2019) (0)
- Sensing Driver Behaviors for Early Recognition of Inattentive Driving (2018) (0)
- VLC-based Data Transfer and Energy Harvesting Mobile System (2021) (0)
- Detecting Mobile Agents Using Identity Fraud (2014) (0)
- Neighborhood prediction based decentralized key management for mobile wireless networks (2013) (0)
- On the Robustness of Localization Algorithms to Signal Strength Attacks (2009) (0)
- Attack Detection Model (2014) (0)
- Robust Statistical Methods for Attack-tolerant Localization (2009) (0)
- A Study of Smartphone User Privacy from the Advertiser's Perspective (2014) (0)
- Supplementary Material to “Distributed Consensus-based Weight Design for Cooperative Spectrum Sensing” (2015) (0)
- MoiréPose (2022) (0)
- General Chairs' Welcome Message (2016) (0)
- Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones (2015) (0)
- Demo: Device-free Activity Monitoring Through Real-time Analysis on Prevalent WiFi Signals (2019) (0)
- Mobile Light Storage: Make the Light Smarter (2020) (0)
- VIBAUTH-PHYSICAL VIBRATION BASED USER AUTHENTICATION LEVERAGING DEEP LEARNING (2019) (0)
- State-of-Art Researches (2018) (0)
- Authentication of Voice Commands by Leveraging Vibrations in Wearables (2021) (0)
- Demo Abstract: GRAIL: General Real-Time Adaptable Indoor Localization (2006) (0)
- Feasibility of Launching User Spoofing (2014) (0)
- Poster: Video Chat Scam Detection Leveraging Screen Light Reflection (2019) (0)
- Spearphone (2021) (0)
- Session details: Keynote Address II (2018) (0)
- Spatio-Temporal Access Control by Dual-using Sensor Networks (2009) (0)
- Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, MobiCom 2016, New York City, NY, USA, October 3-7, 2016 (2016) (0)
- Inferring Mobile Payment Passcodes Leveraging Wearable Devices (2018) (0)
- HAND-GESTURE SENSING LEVERAGING RADIO AND VIBRATION SIGNALS (2019) (0)
- Temporal Privacy in Wireless Networks (2009) (0)
- BatComm (2020) (0)
- A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric MobileWireless Networks (2010) (0)
- CardioCam (2019) (0)
- A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks (2010) (0)
- Sensing Vehicle Conditions for Detecting Driving Behaviors (2018) (0)
This paper list is powered by the following services:
Other Resources About Yingying Chen
What Schools Are Affiliated With Yingying Chen?
Yingying Chen is affiliated with the following schools: