Yingying Chen - Publications

Affiliations: 
Electrical and Computer Engineering Stevens Institute of Technology 

42 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Wang Z, Cao Y, Kong L, Chen G, Yu J, Tang S, Chen Y. Reference Waveforms Forward Concurrent Transmissions in ZigBee Communications Ieee Acm Transactions On Networking. 28: 1629-1642. DOI: 10.1109/Tnet.2020.2992271  0.302
2020 Ren Y, Wang C, Chen Y, Chuah MC, Yang J. Signature Verification Using Critical Segments for Securing Mobile Transactions Ieee Transactions On Mobile Computing. 19: 724-739. DOI: 10.1109/Tmc.2019.2897657  0.334
2020 Liu J, Liu H, Chen Y, Wang Y, Wang C. Wireless Sensing for Human Activity: A Survey Ieee Communications Surveys and Tutorials. 22: 1629-1645. DOI: 10.1109/Comst.2019.2934489  0.394
2020 Guo X, Liu J, Chen Y. When your wearables become your fitness mate Smart Health. 16: 100114. DOI: 10.1016/J.Smhl.2020.100114  0.317
2020 Bai Y, Lu L, Cheng J, Liu J, Chen Y, Yu J. Acoustic-based sensing and applications: A survey Computer Networks. 181: 107447. DOI: 10.1016/J.Comnet.2020.107447  0.36
2020 Wang C, Wang Y, Chen Y, Liu H, Liu J. User authentication on mobile devices: Approaches, threats and trends Computer Networks. 170: 107118. DOI: 10.1016/J.Comnet.2020.107118  0.364
2019 Lu L, Yu J, Chen Y, Liu H, Zhu Y, Kong L, Li M. Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones Ieee Acm Transactions On Networking. 27: 447-460. DOI: 10.1109/Tnet.2019.2891733  0.35
2019 Wang Y, Chen Y, Ye F, Liu H, Yang J. Implications of smartphone user privacy leakage from the advertiser's perspective Pervasive and Mobile Computing. 53: 13-32. DOI: 10.1016/J.Pmcj.2018.12.006  0.348
2018 Wang C, Guo X, Chen Y, Wang Y, Liu B. Personal PIN Leakage from Wearable Devices Ieee Transactions On Mobile Computing. 17: 646-660. DOI: 10.1109/Tmc.2017.2737533  0.377
2018 Liu H, Wang Y, Liu J, Yang J, Chen Y, Poor HV. Authenticating Users Through Fine-Grained Channel Information Ieee Transactions On Mobile Computing. 17: 251-264. DOI: 10.1109/Tmc.2017.2718540  0.37
2018 Liu J, Chen Y, Wang Y, Chen X, Cheng J, Yang J. Monitoring Vital Signs and Postures During Sleep Using WiFi Signals Ieee Internet of Things Journal. 5: 2071-2084. DOI: 10.1109/Jiot.2018.2822818  0.338
2018 Jiang C, Fahad M, Guo Y, Chen Y. Robot-assisted smartphone localization for human indoor tracking Robotics and Autonomous Systems. 106: 82-94. DOI: 10.1016/J.Robot.2018.04.011  0.321
2017 Yu J, Chen Y, Li J. Color Scheme Adaptation to Enhance User Experience on Smartphone Displays Leveraging Ambient Light Ieee Transactions On Mobile Computing. 16: 688-701. DOI: 10.1109/Tmc.2016.2575824  0.31
2017 Liu H, Chen Y, Chuah MC, Yang J, Poor HV. Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching Ieee Transactions On Dependable and Secure Computing. 14: 377-391. DOI: 10.1109/Tdsc.2015.2479624  0.318
2015 Shu T, Chen Y, Yang J. Protecting multi-lateral localization privacy in pervasive environments Ieee/Acm Transactions On Networking. 23: 1688-1701. DOI: 10.1109/Tnet.2015.2478881  0.336
2015 Ren Y, Chen Y, Chuah MC, Yang J. User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems Ieee Transactions On Mobile Computing. 14: 1961-1974. DOI: 10.1109/Tmc.2014.2365185  0.327
2015 Zheng X, Yang J, Chen Y, Xiong H. An adaptive framework coping with dynamic target speed for device-free passive localization Ieee Transactions On Mobile Computing. 14: 1138-1150. DOI: 10.1109/Tmc.2014.2347303  0.318
2015 Dong X, Yu J, Zhu Y, Chen Y, Luo Y, Li M. SECO: Secure and scalable data collaboration services in cloud computing Computers & Security. 50: 91-105. DOI: 10.1016/J.Cose.2015.01.003  0.3
2014 Liu H, Wang H, Chen Y, Jia D. Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks Acm Transactions On Sensor Networks. 10: 49. DOI: 10.1145/2594774  0.325
2014 Wang Y, Chuah M, Chen Y. Incentive Based Data Sharing in Delay Tolerant Mobile Networks Ieee Transactions On Wireless Communications. 13: 370-381. DOI: 10.1109/Twc.2013.120413.130670  0.383
2014 Liu Z, Liu H, Xu W, Chen Y. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks Ieee Transactions On Parallel and Distributed Systems. 25: 508-517. DOI: 10.1109/Tpds.2013.33  0.327
2014 Liu H, Yang J, Sidhom S, Wang Y, Chen Y, Ye F. Accurate WiFi Based Localization for Smartphones Using Peer Assistance Ieee Transactions On Mobile Computing. 13: 2199-2214. DOI: 10.1109/Tmc.2013.140  0.359
2014 Ding G, Wang J, Wu Q, Zhang L, Zou Y, Yao Y, Chen Y. Robust Spectrum Sensing With Crowd Sensors Ieee Transactions On Communications. 62: 3129-3143. DOI: 10.1109/Tcomm.2014.2346775  0.304
2014 Wang Y, Chen Y, Martin RP. Leveraging wi-fi signals to monitor human queues Ieee Pervasive Computing. 13: 14-17. DOI: 10.1109/Mprv.2014.28  0.335
2014 Dong X, Yu J, Luo Y, Chen Y, Xue G, Li M. Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing Computers & Security. 42: 151-164. DOI: 10.1016/J.Cose.2013.12.002  0.311
2013 Yang J, Chen YJ, Trappe W, Cheng J. Detection and localization of multiple spoofing attackers in wireless networks Ieee Transactions On Parallel and Distributed Systems. 24: 44-58. DOI: 10.1109/Tpds.2012.104  0.354
2013 Ding G, Wang J, Wu Q, Song F, Chen Y. Spectrum Sensing in Opportunity-Heterogeneous Cognitive Sensor Networks: How to Cooperate? Ieee Sensors Journal. 13: 4247-4255. DOI: 10.1109/Jsen.2013.2264161  0.301
2013 Zheng X, Chen Y, Wang H, Liu H, Liu R. Neighborhood prediction based decentralized key management for mobile wireless networks Wireless Networks. 19: 1387-1406. DOI: 10.1007/S11276-013-0540-X  0.346
2012 Liu Z, Liu H, Xu W, Chen Y. Exploiting Jamming-Caused Neighbor Changes for Jammer Localization Ieee Transactions On Parallel and Distributed Systems. 23: 547-555. DOI: 10.1109/Tpds.2011.154  0.331
2012 Yang J, Sidhom S, Chandrasekaran G, Vu T, Liu H, Cecan N, Chen Y, Gruteser M, Martin RP. Sensing Driver Phone Use with Acoustic Ranging through Car Speakers Ieee Transactions On Mobile Computing. 11: 1426-1440. DOI: 10.1109/Tmc.2012.92  0.343
2012 Li X, Chen Y, Yang J, Zheng X. Achieving robust wireless localization resilient to signal strength attacks Wireless Networks. 18: 45-58. DOI: 10.1007/S11276-011-0386-Z  0.338
2012 Yang J, Chen Y. Toward attack-resistant localization under infrastructure attacks Security and Communication Networks. 5: 384-403. DOI: 10.1002/Sec.323  0.345
2011 Liu R, Zheng X, Liu H, Wang H, Chen Y. Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks Wireless Networks. 17: 1833-1850. DOI: 10.1007/S11276-011-0382-3  0.328
2010 Yang J, Chen Y, Desai S, Quoraishee S. Passive intrusion detection in wireless networks by exploiting clustering-based learning Proceedings of Spie. 7706: 770604. DOI: 10.1117/12.852676  0.331
2010 Chen Y, Yang J, Trappe W, Martin RP. Detecting and localizing identity-based attacks in wireless and sensor networks Ieee Transactions On Vehicular Technology. 59: 2418-2434. DOI: 10.1109/Tvt.2010.2044904  0.359
2010 Chen S, Chen Y, Trappe W. Inverting systems of embedded sensors for position verification in location-aware applications Ieee Transactions On Parallel and Distributed Systems. 21: 722-736. DOI: 10.1109/Tpds.2009.110  0.319
2010 Ren Y, Chuah MC, Yang J, Chen Y. Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks] Ieee Wireless Communications. 17: 36-42. DOI: 10.1109/Mwc.2010.5601956  0.317
2010 Liu H, Liu Z, Chen Y, Xu W. Determining the position of a jammer using a virtual-force iterative approach Wireless Networks. 17: 531-547. DOI: 10.1007/S11276-010-0295-6  0.334
2009 Chen Y, Kleisouris K, Li X, Trappe W, Martin RP. A security and robustness performance analysis of localization algorithms to signal strength attacks Acm Transactions On Sensor Networks. 5. DOI: 10.1145/1464420.1464422  0.324
2009 Chandrasekaran G, Ergin MA, Gruteser M, Martin RP, Yang J, Chen Y. DECODE: Exploiting shadow fading to DEtect COMoving wireless devices Ieee Transactions On Mobile Computing. 8: 1663-1675. DOI: 10.1109/Tmc.2009.131  0.347
2008 Chen S, Chen Y, Trappe W. Exploiting environmental properties for wireless localization Acm Sigmobile Mobile Computing and Communications Review. 12: 49. DOI: 10.1145/1374512.1374528  0.324
2008 Chen Y, Chandrasekaran G, Elnahrawy E, Francisco JA, Kleisouris K, Li X, Martin RP, Moore RS, Turgut B. GRAIL: A general purpose localization system Sensor Review. 28: 115-124. DOI: 10.1108/02602280810856679  0.332
Show low-probability matches.