Yingying Chen
#152,007
Most Influential Person Now
Computer scientist
Yingying Chen's AcademicInfluence.com Rankings
Yingying Chencomputer-science Degrees
Computer Science
#8102
World Rank
#8523
Historical Rank
Machine Learning
#3309
World Rank
#3348
Historical Rank
Artificial Intelligence
#3611
World Rank
#3662
Historical Rank
Database
#5254
World Rank
#5454
Historical Rank

Download Badge
Computer Science
Yingying Chen's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Yingying Chen Influential?
(Suggest an Edit or Addition)According to Wikipedia, Yingying Chen is a computer scientist whose research involves mobile computing, the internet of things, the security implications of mobile sensor data, wearable technology, and activity trackers. She is a professor at Rutgers University, where she heads the Department of Electrical and Computer Engineering and directs the Data Analysis and Information SecuritY Lab.
Yingying Chen's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures (2014) (736)
- Push the limit of WiFi based localization for smartphones (2012) (431)
- Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi (2015) (382)
- Detecting and Localizing Wireless Spoofing Attacks (2007) (286)
- Detecting driver phone use leveraging car speakers (2011) (236)
- Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks (2010) (209)
- A Practical Approach to Landmark Deployment for Indoor Localization (2006) (208)
- Fast and practical secret key extraction by exploiting channel response (2013) (198)
- Indoor Localization Using Improved RSS-Based Lateration Methods (2009) (189)
- Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT (2017) (184)
- Sensing vehicle dynamics for determining driver phone use (2013) (178)
- Kernel-Based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions (2013) (173)
- Accurate WiFi Based Localization for Smartphones Using Peer Assistance (2014) (148)
- Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks (2012) (136)
- VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones (2016) (136)
- Snooping Keystrokes with mm-level Audio Ranging on a Single Phone (2015) (133)
- Wireless Sensing for Human Activity: A Survey (2020) (126)
- Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN (2016) (124)
- SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments (2014) (117)
- Detecting Spoofing Attacks in Mobile Wireless Environments (2009) (111)
- Monitoring Vital Signs and Postures During Sleep Using WiFi Signals (2018) (109)
- Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing (2014) (103)
- Fine-grained sleep monitoring: Hearing your breathing with smartphones (2015) (101)
- Fine-Grained Abnormal Driving Behaviors Detection and Identification with Smartphones (2017) (99)
- Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation (2014) (99)
- Accelerating 5G QoE via public-private spectrum sharing (2014) (97)
- Attack Detection in Wireless Localization (2007) (92)
- User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems (2015) (90)
- Empirical Evaluation of the Limits on Localization Using Signal Strength (2009) (89)
- Tracking human queues using single-point signal monitoring (2014) (87)
- ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks (2009) (86)
- D3: Abnormal driving behaviors detection and identification using smartphone sensors (2015) (81)
- The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study (2006) (80)
- LookUp: Enabling Pedestrian Safety Services via Shoe Sensing (2015) (76)
- Smartphone based user verification leveraging gait recognition for mobile healthcare systems (2013) (75)
- Localizing jammers in wireless networks (2009) (75)
- VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration (2017) (74)
- Practical user authentication leveraging channel state information (CSI) (2014) (73)
- Multi - Touch in the Air: Device-Free Finger Tracking and Gesture Recognition via COTS RFID (2018) (71)
- Exploiting Jamming-Caused Neighbor Changes for Jammer Localization (2012) (70)
- Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments (2010) (69)
- Tracking vehicular speed variations by warping mobile phone signal strengths (2011) (69)
- Accuracy characterization of cell tower localization (2010) (67)
- FitCoach: Virtual fitness coach empowered by wearable mobile devices (2017) (63)
- BreathListener: Fine-grained Breathing Monitoring in Driving Environments Utilizing Acoustic Signals (2019) (61)
- Toward Detection of Unsafe Driving with Wearables (2015) (60)
- Real-Time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems (2020) (59)
- Authenticating Users Through Fine-Grained Channel Information (2018) (57)
- Vehicular speed estimation using received signal strength from mobile phones (2010) (56)
- Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones (2019) (55)
- Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks] (2010) (55)
- A theoretical analysis of wireless localization using RF-based fingerprint matching (2008) (54)
- MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks (2010) (54)
- An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing (2021) (53)
- AdvPulse: Universal, Synchronization-free, and Targeted Audio Adversarial Attacks via Subsecond Perturbations (2020) (53)
- Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi (2021) (53)
- LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals (2018) (53)
- Distributed Cooperative Spectrum Sensing Based on Weighted Average Consensus (2011) (52)
- Distributed Consensus-Based Weight Design for Cooperative Spectrum Sensing (2015) (51)
- Determining the position of a jammer using a virtual-force iterative approach (2011) (51)
- Leveraging wearables for steering and driver tracking (2016) (49)
- Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors (2016) (46)
- A Study of Localization Accuracy Using Multiple Frequencies and Powers (2014) (46)
- WiFi-Enabled Smart Human Dynamics Monitoring (2017) (45)
- Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks (2009) (43)
- Practical Adversarial Attacks Against Speaker Recognition Systems (2020) (43)
- Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording (2010) (43)
- Multi-lateral privacy-preserving localization in pervasive environments (2014) (42)
- Device-free Personalized Fitness Assistant Using WiFi (2018) (41)
- Detection and Localization of Multiple Spoofing Attackers in Wireless Networks (2013) (40)
- Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges (2010) (40)
- Sensing Driver Phone Use with Acoustic Ranging through Car Speakers (2012) (40)
- Detecting sybil attacks inwireless and sensor networks using cluster analysis (2008) (40)
- FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi (2019) (40)
- User authentication on mobile devices: Approaches, threats and trends (2020) (40)
- Incentive Based Data Sharing in Delay Tolerant Mobile Networks (2014) (39)
- Measuring human queues using WiFi signals (2013) (39)
- Towards In-baggage Suspicious Object Detection Using Commodity WiFi (2018) (39)
- MU-ID: Multi-user Identification Through Gaits Using Millimeter Wave Radios (2020) (38)
- Localizing Multiple Jamming Attackers in Wireless Networks (2011) (37)
- An Error-Minimizing Framework for Localizing Jammers in Wireless Networks (2014) (36)
- E3: energy-efficient engine for frame rate adaptation on smartphones (2013) (36)
- The Impact of Using Multiple Antennas on Wireless Localization (2008) (34)
- Locating Rogue Access Point Using Fine-Grained Channel Information (2017) (34)
- The concept of decentralized and secure electronic marketplace (2008) (34)
- ER: Early recognition of inattentive driving leveraging audio devices on smartphones (2017) (33)
- A security and robustness performance analysis of localization algorithms to signal strength attacks (2009) (32)
- Securing Emerging Wireless Systems - Lower-layer Approaches (2008) (32)
- VibSense: Sensing Touches on Ubiquitous Surfaces through Vibration (2017) (31)
- On the limits of positioning-based pedestrian risk awareness (2014) (30)
- BigRoad: Scaling Road Data Acquisition for Dependable Self-Driving (2017) (30)
- RF-ECG (2018) (30)
- Non-interactive localization of cognitive radios based on dynamic signal strength mapping (2009) (29)
- Enabling Fast and Universal Audio Adversarial Attack Using Generative Model (2020) (28)
- Sensing Human-Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones (2015) (28)
- PPG-based Finger-level Gesture Recognition Leveraging Wearables (2018) (28)
- Winect: 3D Human Pose Tracking for Free-form Activity Using Commodity WiFi (2021) (27)
- Uber-in-light: Unobtrusive visible light communication leveraging complementary color channel (2016) (27)
- TrueHeart: Continuous Authentication on Wrist-worn Wearables Using PPG-based Biometrics (2020) (26)
- KeyLiSterber: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals (2019) (26)
- Detecting anomalous spectrum usage in dynamic spectrum access networks (2012) (26)
- SECO: Secure and scalable data collaboration services in cloud computing (2015) (25)
- Leveraging Audio Signals for Early Recognition of Inattentive Driving with Smartphones (2018) (24)
- Empirical Evaluation of Wireless Localization when Using Multiple Antennas (2010) (24)
- Detection of On-Road Vehicles Emanating GPS Interference (2014) (23)
- Achieving secure and efficient data collaboration in cloud computing (2013) (23)
- Robust wireless localization to attacks on access points (2009) (23)
- Incentive driven information sharing in delay tolerant mobile networks (2012) (23)
- An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization (2015) (21)
- Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations (2019) (21)
- Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks (2010) (21)
- Protecting Multi-Lateral Localization Privacy in Pervasive Environments (2015) (21)
- Enabling Fine-Grained Finger Gesture Recognition on Commodity WiFi Devices (2022) (20)
- Towards Low-Cost Sign Language Gesture Recognition Leveraging Wearables (2021) (20)
- Acoustic-based sensing and applications: A survey (2020) (19)
- Accurate rogue access point localization leveraging fine-grained channel information (2014) (19)
- Critical segment based real-time E-signature for securing mobile transactions (2015) (19)
- Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing (2014) (19)
- Adaptive device-free passive localization coping with dynamic target speed (2013) (18)
- Designing localization algorithms robust to signal strength attacks (2010) (18)
- Signature Verification Using Critical Segments for Securing Mobile Transactions (2020) (18)
- Continuous User Verification via Respiratory Biometrics (2020) (18)
- GRAIL: a general purpose localization system (2008) (18)
- VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones (2020) (17)
- Personal PIN Leakage from Wearable Devices (2018) (17)
- RF-Kinect (2018) (17)
- DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices (2009) (17)
- Relationship-based Detection of Spoofing-related Anomalous Traffic (2009) (16)
- Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers (2019) (16)
- Social closeness based clone attack detection for mobile healthcare system (2012) (15)
- CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping (2019) (15)
- Exploiting Environmental Properties for Wireless Localization and Location Aware Applications (2008) (15)
- Your Heart Won't Lie: PPG-based Continuous Authentication on Wrist-worn Wearable Devices (2018) (14)
- Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching (2015) (14)
- Error minimizing jammer localization through smart estimation of ambient noise (2012) (14)
- Poster: hearing your breathing: fine-grained sleep monitoring using smartphones (2014) (14)
- Noninvasive Fine-Grained Sleep Monitoring Leveraging Smartphones (2019) (14)
- Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers (2021) (13)
- WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables (2019) (13)
- Achieving robust wireless localization resilient to signal strength attacks (2012) (13)
- SteerTrack: Acoustic-Based Device-Free Steering Tracking Leveraging Smartphones (2018) (12)
- Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments (2011) (11)
- Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare (2011) (11)
- Behavior Recognition Based on Wi-Fi CSI: Part 1 (2017) (11)
- Robot-assisted human indoor localization using the Kinect sensor and smartphones (2014) (11)
- Demo: Hands-Free Human Activity Recognition Using Millimeter-Wave Sensors (2019) (11)
- Robot-assisted smartphone localization for human indoor tracking (2018) (11)
- Towards Understanding the Advertiser's Perspective of Smartphone User Privacy (2015) (11)
- GoPose: 3D Human Pose Estimation Using WiFi (2022) (10)
- GoPose: 3D Human Pose Estimation Using WiFi (2022) (10)
- GRAIL: general real-time adaptable indoor localization (2006) (10)
- DECODE : Detecting co-moving wireless devices (2008) (10)
- WiFi-Enabled User Authentication through Deep Learning in Daily Activities (2021) (10)
- Real-time, Robust and Adaptive Universal Adversarial Attacks Against Speaker Recognition Systems (2021) (10)
- WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi Signals (2020) (9)
- EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech (2021) (9)
- Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points (2017) (9)
- When your wearables become your fitness mate (2020) (9)
- Leveraging Acoustic Signals for Vehicle Steering Tracking with Smartphones (2020) (9)
- Towards self-healing smart grid via intelligent local controller switching under jamming (2013) (9)
- Characterizing the impact of multi-frequency and multi-power on localization accuracy (2010) (9)
- VocalLock (2020) (9)
- Proactive call drop avoidance in UMTS networks (2013) (9)
- Sensing Ambient Light for User Experience-Oriented Color Scheme Adaptation on Smartphone Displays (2015) (8)
- Tracking free-form activity using wifi signals (2021) (8)
- Leveraging Breathing for Continuous User Authentication (2018) (8)
- On the Performance of Wireless Indoor Localization Using Received Signal Strength (2019) (8)
- Simultaneous Monitoring of Multiple People’s Vital Sign Leveraging a Single Phased-MIMO Radar (2021) (8)
- ToothSonic: Earable Authentication via Acoustic Toothprint (2022) (7)
- I3: Sensing Scrolling Human-Computer Interactions for Intelligent Interest Inference on Smartphones (2019) (7)
- A decentralized key management scheme via neighborhood prediction in mobile wireless networks (2010) (7)
- ADLS: Attack Detection for Wireless Localization Using Least Squares (2007) (7)
- Behavior Recognition Based on Wi-Fi CSI: Part 2 (2018) (7)
- WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training (2020) (7)
- Your Phone Tells Us The Truth: Driver Identification Using Smartphone on One Turn (2018) (7)
- ToothSonic: Earable Authentication via Acoustic Toothprint (2022) (7)
- H2K: A Heartbeat-Based Key Generation Framework for ECG and PPG Signals (2021) (7)
- Signal Processing for Smart Vehicle Technologies: Part 2 [From the Guest Editors] (2017) (7)
- Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors (2021) (6)
- Driver Identification Leveraging Single-turn Behaviors via Mobile Devices (2020) (6)
- BreathListener (2019) (6)
- Robust Continuous Authentication Using Cardiac Biometrics From Wrist-Worn Wearables (2022) (6)
- Secret key distribution leveraging color shift over visible light channel (2017) (6)
- Securing Mobile Location-based Services through position verification leveraging key distribution (2012) (6)
- VPad: Virtual Writing Tablet for Laptops Leveraging Acoustic Signals (2018) (6)
- P2E: Privacy-preserving and effective cloud data sharing service (2013) (6)
- Defending Against Identity-Based Attacks in Wireless Networks (2012) (5)
- Towards Environment-independent Behavior-based User Authentication Using WiFi (2020) (5)
- Earable Authentication via Acoustic Toothprint (2021) (5)
- A 2000-year documentary record of levee breaches on the lower Yellow River and their relationship with climate changes and human activities (2020) (5)
- Smart Health mPose : Environment- and subject-agnostic 3D skeleton posture reconstruction leveraging a single mmWave device (2021) (5)
- Invisible and Efficient Backdoor Attacks for Compressed Deep Neural Networks (2022) (5)
- EchoLock: Towards Low-effort Mobile User Identification Leveraging Structure-borne Echos (2020) (5)
- Probing into the Physical Layer: Moving Tag Detection for Large-Scale RFID Systems (2020) (5)
- 3D Human Pose Estimation Using WiFi Signals (2021) (5)
- Implications of smartphone user privacy leakage from the advertiser's perspective (2019) (4)
- Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array (2021) (4)
- I3 (2019) (4)
- WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity (2020) (4)
- Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS) (2016) (4)
- Leveraging Wi-Fi Signals to Monitor Human Queues (2014) (4)
- A Low-cost, Smartphone-only Pulse Transit Time Measurement System Using Cardio-mechanical Signals and Optical Sensors* (2018) (4)
- Environment-independent In-baggage Object Identification Using WiFi Signals (2021) (4)
- Signal Processing for Smart Vehicle Technologies [From the Guest Editors] (2017) (4)
- Color Scheme Adaptation to Enhance User Experience on Smartphone Displays Leveraging Ambient Light (2017) (4)
- Bipartite Graph Matching Based Secret Key Generation (2021) (4)
- Towards safer texting while driving through stop time prediction (2016) (4)
- BatComm: enabling inaudible acoustic communication with high-throughput for mobile devices (2020) (4)
- A social community based approach for reducing the propagation of infectious diseases in healthcare (2010) (4)
- Toward attack-resistant localization under infrastructure attacks (2012) (4)
- TOWARDS A DECENTRALIZED AND SECURE ELECTRONIC MARKETPLACE (2005) (4)
- SalsaAsst: Beat Counting System Empowered by Mobile Devices to Assist Salsa Dancers (2017) (4)
- Semi-black-box Attacks Against Speech Recognition Systems Using Adversarial Samples (2019) (4)
- Leveraging Acoustic Signals for Fine-Grained Breathing Monitoring in Driving Environments (2022) (4)
- Reference Waveforms Forward Concurrent Transmissions in ZigBee Communications (2020) (4)
- A Smartphone-Only Pulse Transit Time Monitor Based on Cardio-Mechanical and Photoplethysmography Modalities (2019) (4)
- TouchPass (2020) (4)
- Breathing Sound-based Exercise Intensity Monitoring via Smartphones (2021) (3)
- Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching (2011) (3)
- Localizing Acoustic Objects on a Single Phone (2021) (3)
- VibKeyboard: virtual keyboard leveraging physical vibration: demo (2016) (3)
- HyperEar: Indoor Remote Object Finding with a Single Phone (2019) (3)
- Secure Coded Computation for Efficient Distributed Learning in Mobile IoT (2021) (3)
- Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks (2011) (3)
- Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing (2021) (3)
- Pervasive Wireless Environments: Detecting and Localizing User Spoofing (2014) (3)
- Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals (2020) (3)
- Neighborhood prediction based decentralized key management for mobile wireless networks (2013) (3)
- Forward the Collision Decomposition in ZigBee (2019) (3)
- Winect (2021) (3)
- A New Architecture for Personalization Engines: An Open Source Approach (2008) (2)
- Mobile Sensing Enabled Robust Detection of Security Threats in Urban Environments (2010) (2)
- MIXP: Efficient Deep Neural Networks Pruning for Further FLOPs Compression via Neuron Bond (2021) (2)
- Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices (2021) (2)
- To Do or Not to Do: Metadata-Guided Query Evaluation in Content Caching Networks (2009) (2)
- A trusted infrastructure for facilitating access control of location information (2008) (2)
- Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications (2010) (2)
- Poster: Inaudible High-throughput Communication Through Acoustic Signals (2019) (2)
- Securing wireless localization against signal strength attacks (2007) (2)
- Jamming Attacks and Radio Interference (2009) (2)
- Extracting jamming signals to locate radio interferers and jammers (2012) (2)
- FingerPass (2019) (2)
- A Low-Cost Wi-Fi-Based Solution for Measuring Human Queues (2015) (2)
- Distributed Cooperative Spectrum Sensing Using Weighted Average Consensus (2012) (2)
- HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks (2021) (2)
- Automatic personal fitness assistance through wearable mobile devices: poster (2016) (2)
- HearHere: smartphone based audio localization using time difference of arrival: demo (2016) (2)
- A Brief Survey of Jamming and Defense Strategies (2009) (2)
- Prediction of near likely nodes in data-centric mobile wireless networks (2009) (2)
- Wi-Fi-Enabled Automatic Eating Moment Monitoring Using Smartphones (2019) (2)
- Demo: Toward Continuous User Authentication Using PPG in Commodity Wrist-worn Wearables (2019) (2)
- Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks (2014) (1)
- Detecting Jamming Attacks and Radio Interference (2009) (1)
- Collaborative Group Key Extraction Leveraging Received Signal Strength in Real Mobile Environments (2012) (1)
- Poster: Inferring Mobile Payment Passcodes Leveraging Wearable Devices. (2018) (1)
- EchoLock: Towards Low Effort Mobile User Identification (2020) (1)
- Demo: Monitoring Movement Dynamics of Robot Cars and Drones Using Smartphone’s Built-in Sensors (2019) (1)
- Using a multiple analytical distribution filter for underwater localization (2009) (1)
- Video: LookUp!: Enabling Pedestrian Safety Services via Shoe Sensing (2015) (1)
- Proactive User Authentication Using WiFi Signals in Dynamic Networks (2019) (1)
- SubTrack: Enabling Real-Time Tracking of Subway Riding on Mobile Devices (2017) (1)
- Overview of Wireless Localization (2009) (1)
- NORM: A Decentralized Location Verification Mechanism for Wireless Sensor Networks (2008) (1)
- Achieving robust wireless localization resilient to signal strength attacks (2011) (1)
- Motion Sensor-based Privacy Attack on Smartphones. (2020) (1)
- Exploiting environmental properties for wireless localization (2008) (1)
- Detection and Localizing Multiple Spoofing Attackers (2014) (1)
- LiveScreen: Video Chat Liveness Detection Leveraging Skin Reflection (2020) (1)
- Enabling Secret Key Distribution Over Screen-to-Camera Channel Leveraging Color Shift Property (2021) (1)
- Sensing on ubiquitous surfaces via vibration signals: poster (2016) (1)
- Passive intrusion detection in wireless networks by exploiting clustering-based learning (2010) (1)
- Detecting and LocalizingWirelessSpoofingAttacks (2007) (1)
- Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors (2020) (1)
- GRAIL: A General Purpose Real Time Localization System: Version 1.0 (2009) (0)
- Controller Manager - Technical Report (0)
- Sensing Vehicle Dynamics for Abnormal Driving Detection (2018) (0)
- GRAIL: A General Purpose Real Time Localization System: Version 1.0 (2009) (0)
- S ECURITY A ND P RIVACY I N E MERGING W IRELESS N ETWORKS (2010) (0)
- PIN number-based authentication leveraging physical vibration: poster (2016) (0)
- m <sup>3</sup> Track (2022) (0)
- Research on Blind Estimation Method of Low SNR Long Pseudo Code Direct Spread Signal (2019) (0)
- MultiAuth (2021) (0)
- RTBP : Real Time Bayesian Positioning System for Wireless and Sensor Networks (2006) (0)
- Good vibrations: accessing ‘smart’ systems by touching any solid surface (2018) (0)
- Statistical learning and data mining in biological databases (2009) (0)
- Channel Surfing: Defending Wireless Networks against Radio Interference (2009) (0)
- Sensing Vehicle Dynamics with Smartphones (2018) (0)
- HARNESSING ADVERSARIAL SAMPLES AGAINST VOICE ASSISTANTS (2019) (0)
- Sensing Driver Behaviors for Early Recognition of Inattentive Driving (2018) (0)
- VLC-based Data Transfer and Energy Harvesting Mobile System (2021) (0)
- Detecting Mobile Agents Using Identity Fraud (2014) (0)
- Neighborhood prediction based decentralized key management for mobile wireless networks (2013) (0)
- On the Robustness of Localization Algorithms to Signal Strength Attacks (2009) (0)
- Attack Detection Model (2014) (0)
- Robust Statistical Methods for Attack-tolerant Localization (2009) (0)
- A Study of Smartphone User Privacy from the Advertiser's Perspective (2014) (0)
- Supplementary Material to “Distributed Consensus-based Weight Design for Cooperative Spectrum Sensing” (2015) (0)
- MoiréPose (2022) (0)
- General Chairs' Welcome Message (2016) (0)
- Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones (2015) (0)
- Demo: Device-free Activity Monitoring Through Real-time Analysis on Prevalent WiFi Signals (2019) (0)
- Mobile Light Storage: Make the Light Smarter (2020) (0)
- VIBAUTH-PHYSICAL VIBRATION BASED USER AUTHENTICATION LEVERAGING DEEP LEARNING (2019) (0)
- State-of-Art Researches (2018) (0)
- Authentication of Voice Commands by Leveraging Vibrations in Wearables (2021) (0)
- Demo Abstract: GRAIL: General Real-Time Adaptable Indoor Localization (2006) (0)
- Feasibility of Launching User Spoofing (2014) (0)
- Poster: Video Chat Scam Detection Leveraging Screen Light Reflection (2019) (0)
- Spearphone (2021) (0)
- Session details: Keynote Address II (2018) (0)
- Spatio-Temporal Access Control by Dual-using Sensor Networks (2009) (0)
- Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, MobiCom 2016, New York City, NY, USA, October 3-7, 2016 (2016) (0)
- Inferring Mobile Payment Passcodes Leveraging Wearable Devices (2018) (0)
- HAND-GESTURE SENSING LEVERAGING RADIO AND VIBRATION SIGNALS (2019) (0)
- Temporal Privacy in Wireless Networks (2009) (0)
- BatComm (2020) (0)
- A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric MobileWireless Networks (2010) (0)
- CardioCam (2019) (0)
- A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks (2010) (0)
- Sensing Vehicle Conditions for Detecting Driving Behaviors (2018) (0)
This paper list is powered by the following services:
Other Resources About Yingying Chen
What Schools Are Affiliated With Yingying Chen?
Yingying Chen is affiliated with the following schools: