Year |
Citation |
Score |
2020 |
Wang Z, Cao Y, Kong L, Chen G, Yu J, Tang S, Chen Y. Reference Waveforms Forward Concurrent Transmissions in ZigBee Communications Ieee Acm Transactions On Networking. 28: 1629-1642. DOI: 10.1109/Tnet.2020.2992271 |
0.302 |
|
2020 |
Ren Y, Wang C, Chen Y, Chuah MC, Yang J. Signature Verification Using Critical Segments for Securing Mobile Transactions Ieee Transactions On Mobile Computing. 19: 724-739. DOI: 10.1109/Tmc.2019.2897657 |
0.334 |
|
2020 |
Liu J, Liu H, Chen Y, Wang Y, Wang C. Wireless Sensing for Human Activity: A Survey Ieee Communications Surveys and Tutorials. 22: 1629-1645. DOI: 10.1109/Comst.2019.2934489 |
0.394 |
|
2020 |
Guo X, Liu J, Chen Y. When your wearables become your fitness mate Smart Health. 16: 100114. DOI: 10.1016/J.Smhl.2020.100114 |
0.317 |
|
2020 |
Bai Y, Lu L, Cheng J, Liu J, Chen Y, Yu J. Acoustic-based sensing and applications: A survey Computer Networks. 181: 107447. DOI: 10.1016/J.Comnet.2020.107447 |
0.36 |
|
2020 |
Wang C, Wang Y, Chen Y, Liu H, Liu J. User authentication on mobile devices: Approaches, threats and trends Computer Networks. 170: 107118. DOI: 10.1016/J.Comnet.2020.107118 |
0.364 |
|
2019 |
Lu L, Yu J, Chen Y, Liu H, Zhu Y, Kong L, Li M. Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones Ieee Acm Transactions On Networking. 27: 447-460. DOI: 10.1109/Tnet.2019.2891733 |
0.35 |
|
2019 |
Wang Y, Chen Y, Ye F, Liu H, Yang J. Implications of smartphone user privacy leakage from the advertiser's perspective Pervasive and Mobile Computing. 53: 13-32. DOI: 10.1016/J.Pmcj.2018.12.006 |
0.348 |
|
2018 |
Wang C, Guo X, Chen Y, Wang Y, Liu B. Personal PIN Leakage from Wearable Devices Ieee Transactions On Mobile Computing. 17: 646-660. DOI: 10.1109/Tmc.2017.2737533 |
0.377 |
|
2018 |
Liu H, Wang Y, Liu J, Yang J, Chen Y, Poor HV. Authenticating Users Through Fine-Grained Channel Information Ieee Transactions On Mobile Computing. 17: 251-264. DOI: 10.1109/Tmc.2017.2718540 |
0.37 |
|
2018 |
Liu J, Chen Y, Wang Y, Chen X, Cheng J, Yang J. Monitoring Vital Signs and Postures During Sleep Using WiFi Signals Ieee Internet of Things Journal. 5: 2071-2084. DOI: 10.1109/Jiot.2018.2822818 |
0.338 |
|
2018 |
Jiang C, Fahad M, Guo Y, Chen Y. Robot-assisted smartphone localization for human indoor tracking Robotics and Autonomous Systems. 106: 82-94. DOI: 10.1016/J.Robot.2018.04.011 |
0.321 |
|
2017 |
Yu J, Chen Y, Li J. Color Scheme Adaptation to Enhance User Experience on Smartphone Displays Leveraging Ambient Light Ieee Transactions On Mobile Computing. 16: 688-701. DOI: 10.1109/Tmc.2016.2575824 |
0.31 |
|
2017 |
Liu H, Chen Y, Chuah MC, Yang J, Poor HV. Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching Ieee Transactions On Dependable and Secure Computing. 14: 377-391. DOI: 10.1109/Tdsc.2015.2479624 |
0.318 |
|
2015 |
Shu T, Chen Y, Yang J. Protecting multi-lateral localization privacy in pervasive environments Ieee/Acm Transactions On Networking. 23: 1688-1701. DOI: 10.1109/Tnet.2015.2478881 |
0.336 |
|
2015 |
Ren Y, Chen Y, Chuah MC, Yang J. User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems Ieee Transactions On Mobile Computing. 14: 1961-1974. DOI: 10.1109/Tmc.2014.2365185 |
0.327 |
|
2015 |
Zheng X, Yang J, Chen Y, Xiong H. An adaptive framework coping with dynamic target speed for device-free passive localization Ieee Transactions On Mobile Computing. 14: 1138-1150. DOI: 10.1109/Tmc.2014.2347303 |
0.318 |
|
2015 |
Dong X, Yu J, Zhu Y, Chen Y, Luo Y, Li M. SECO: Secure and scalable data collaboration services in cloud computing Computers & Security. 50: 91-105. DOI: 10.1016/J.Cose.2015.01.003 |
0.3 |
|
2014 |
Liu H, Wang H, Chen Y, Jia D. Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks Acm Transactions On Sensor Networks. 10: 49. DOI: 10.1145/2594774 |
0.325 |
|
2014 |
Wang Y, Chuah M, Chen Y. Incentive Based Data Sharing in Delay Tolerant Mobile Networks Ieee Transactions On Wireless Communications. 13: 370-381. DOI: 10.1109/Twc.2013.120413.130670 |
0.383 |
|
2014 |
Liu Z, Liu H, Xu W, Chen Y. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks Ieee Transactions On Parallel and Distributed Systems. 25: 508-517. DOI: 10.1109/Tpds.2013.33 |
0.327 |
|
2014 |
Liu H, Yang J, Sidhom S, Wang Y, Chen Y, Ye F. Accurate WiFi Based Localization for Smartphones Using Peer Assistance Ieee Transactions On Mobile Computing. 13: 2199-2214. DOI: 10.1109/Tmc.2013.140 |
0.359 |
|
2014 |
Ding G, Wang J, Wu Q, Zhang L, Zou Y, Yao Y, Chen Y. Robust Spectrum Sensing With Crowd Sensors Ieee Transactions On Communications. 62: 3129-3143. DOI: 10.1109/Tcomm.2014.2346775 |
0.304 |
|
2014 |
Wang Y, Chen Y, Martin RP. Leveraging wi-fi signals to monitor human queues Ieee Pervasive Computing. 13: 14-17. DOI: 10.1109/Mprv.2014.28 |
0.335 |
|
2014 |
Dong X, Yu J, Luo Y, Chen Y, Xue G, Li M. Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing Computers & Security. 42: 151-164. DOI: 10.1016/J.Cose.2013.12.002 |
0.311 |
|
2013 |
Yang J, Chen YJ, Trappe W, Cheng J. Detection and localization of multiple spoofing attackers in wireless networks Ieee Transactions On Parallel and Distributed Systems. 24: 44-58. DOI: 10.1109/Tpds.2012.104 |
0.354 |
|
2013 |
Ding G, Wang J, Wu Q, Song F, Chen Y. Spectrum Sensing in Opportunity-Heterogeneous Cognitive Sensor Networks: How to Cooperate? Ieee Sensors Journal. 13: 4247-4255. DOI: 10.1109/Jsen.2013.2264161 |
0.301 |
|
2013 |
Zheng X, Chen Y, Wang H, Liu H, Liu R. Neighborhood prediction based decentralized key management for mobile wireless networks Wireless Networks. 19: 1387-1406. DOI: 10.1007/S11276-013-0540-X |
0.346 |
|
2012 |
Liu Z, Liu H, Xu W, Chen Y. Exploiting Jamming-Caused Neighbor Changes for Jammer Localization Ieee Transactions On Parallel and Distributed Systems. 23: 547-555. DOI: 10.1109/Tpds.2011.154 |
0.331 |
|
2012 |
Yang J, Sidhom S, Chandrasekaran G, Vu T, Liu H, Cecan N, Chen Y, Gruteser M, Martin RP. Sensing Driver Phone Use with Acoustic Ranging through Car Speakers Ieee Transactions On Mobile Computing. 11: 1426-1440. DOI: 10.1109/Tmc.2012.92 |
0.343 |
|
2012 |
Li X, Chen Y, Yang J, Zheng X. Achieving robust wireless localization resilient to signal strength attacks Wireless Networks. 18: 45-58. DOI: 10.1007/S11276-011-0386-Z |
0.338 |
|
2012 |
Yang J, Chen Y. Toward attack-resistant localization under infrastructure attacks Security and Communication Networks. 5: 384-403. DOI: 10.1002/Sec.323 |
0.345 |
|
2011 |
Liu R, Zheng X, Liu H, Wang H, Chen Y. Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks Wireless Networks. 17: 1833-1850. DOI: 10.1007/S11276-011-0382-3 |
0.328 |
|
2010 |
Yang J, Chen Y, Desai S, Quoraishee S. Passive intrusion detection in wireless networks by exploiting clustering-based learning Proceedings of Spie. 7706: 770604. DOI: 10.1117/12.852676 |
0.331 |
|
2010 |
Chen Y, Yang J, Trappe W, Martin RP. Detecting and localizing identity-based attacks in wireless and sensor networks Ieee Transactions On Vehicular Technology. 59: 2418-2434. DOI: 10.1109/Tvt.2010.2044904 |
0.359 |
|
2010 |
Chen S, Chen Y, Trappe W. Inverting systems of embedded sensors for position verification in location-aware applications Ieee Transactions On Parallel and Distributed Systems. 21: 722-736. DOI: 10.1109/Tpds.2009.110 |
0.319 |
|
2010 |
Ren Y, Chuah MC, Yang J, Chen Y. Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks] Ieee Wireless Communications. 17: 36-42. DOI: 10.1109/Mwc.2010.5601956 |
0.317 |
|
2010 |
Liu H, Liu Z, Chen Y, Xu W. Determining the position of a jammer using a virtual-force iterative approach Wireless Networks. 17: 531-547. DOI: 10.1007/S11276-010-0295-6 |
0.334 |
|
2009 |
Chen Y, Kleisouris K, Li X, Trappe W, Martin RP. A security and robustness performance analysis of localization algorithms to signal strength attacks Acm Transactions On Sensor Networks. 5. DOI: 10.1145/1464420.1464422 |
0.324 |
|
2009 |
Chandrasekaran G, Ergin MA, Gruteser M, Martin RP, Yang J, Chen Y. DECODE: Exploiting shadow fading to DEtect COMoving wireless devices Ieee Transactions On Mobile Computing. 8: 1663-1675. DOI: 10.1109/Tmc.2009.131 |
0.347 |
|
2008 |
Chen S, Chen Y, Trappe W. Exploiting environmental properties for wireless localization Acm Sigmobile Mobile Computing and Communications Review. 12: 49. DOI: 10.1145/1374512.1374528 |
0.324 |
|
2008 |
Chen Y, Chandrasekaran G, Elnahrawy E, Francisco JA, Kleisouris K, Li X, Martin RP, Moore RS, Turgut B. GRAIL: A general purpose localization system Sensor Review. 28: 115-124. DOI: 10.1108/02602280810856679 |
0.332 |
|
Show low-probability matches. |