E-eyes: Device-free location-oriented activity identification using fine-grained WiFi signatures Y Wang, J Liu, Y Chen, M Gruteser, J Yang, H Liu Proceedings of the 20th annual international conference on Mobile computing …, 2014 | 994 | 2014 |
Push the limit of WiFi based localization for smartphones H Liu, Y Gan, J Yang, S Sidhom, Y Wang, Y Chen, F Ye Proceedings of the 18th annual international conference on Mobile computing …, 2012 | 515 | 2012 |
Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT C Shi, J Liu, H Liu, Y Chen Proceedings of the 18th ACM international symposium on mobile ad hoc …, 2017 | 297 | 2017 |
Wireless sensing for human activity: A survey J Liu, H Liu, Y Chen, Y Wang, C Wang IEEE Communications Surveys & Tutorials 22 (3), 1629-1645, 2019 | 285 | 2019 |
Fast and practical secret key extraction by exploiting channel response H Liu, Y Wang, J Yang, Y Chen 2013 Proceedings IEEE Infocom, 3048-3056, 2013 | 282 | 2013 |
Detecting driver phone use leveraging car speakers J Yang, S Sidhom, G Chandrasekaran, T Vu, H Liu, N Cecan, Y Chen, ... Proceedings of the 17th annual international conference on Mobile computing …, 2011 | 268 | 2011 |
Sensing vehicle dynamics for determining driver phone use Y Wang, J Yang, H Liu, Y Chen, M Gruteser, RP Martin Proceeding of the 11th annual international conference on Mobile systems …, 2013 | 215 | 2013 |
Collaborative secret key extraction leveraging received signal strength in mobile wireless networks H Liu, J Yang, Y Wang, Y Chen 2012 Proceedings IEEE Infocom, 927-935, 2012 | 173 | 2012 |
Accurate WiFi based localization for smartphones using peer assistance H Liu, J Yang, S Sidhom, Y Wang, Y Chen, F Ye IEEE Transactions on Mobile Computing 13 (10), 2199-2214, 2013 | 169 | 2013 |
Group secret key generation via received signal strength: Protocols, achievable rates, and implementation H Liu, J Yang, Y Wang, Y Chen, CE Koksal IEEE Transactions on Mobile Computing 13 (12), 2820-2835, 2014 | 149 | 2014 |
Multi-touch in the air: Device-free finger tracking and gesture recognition via COTS RFID C Wang, J Liu, Y Chen, H Liu, L Xie, W Wang, B He, S Lu IEEE INFOCOM 2018-IEEE conference on computer communications, 1691-1699, 2018 | 135 | 2018 |
User authentication on mobile devices: Approaches, threats and trends C Wang, Y Wang, Y Chen, H Liu, J Liu Computer Networks 170, 107118, 2020 | 113 | 2020 |
Lippass: Lip reading-based user authentication on smartphones leveraging acoustic signals L Lu, J Yu, Y Chen, H Liu, Y Zhu, Y Liu, M Li IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1466-1474, 2018 | 109 | 2018 |
Localizing jammers in wireless networks H Liu, X Wenyuan, Y Chen, Z Liu 2009 IEEE International Conference on Pervasive Computing and Communications …, 2009 | 109 | 2009 |
Practical user authentication leveraging channel state information (CSI) H Liu, Y Wang, J Liu, J Yang, Y Chen Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 102 | 2014 |
Lip reading-based user authentication through acoustic sensing on smartphones L Lu, J Yu, Y Chen, H Liu, Y Zhu, L Kong, M Li IEEE/ACM transactions on networking 27 (1), 447-460, 2019 | 101 | 2019 |
Tracking human queues using single-point signal monitoring Y Wang, J Yang, Y Chen, H Liu, M Gruteser, RP Martin Proceedings of the 12th annual international conference on Mobile systems …, 2014 | 101 | 2014 |
Exploiting jamming-caused neighbor changes for jammer localization Z Liu, H Liu, W Xu, Y Chen IEEE Transactions on Parallel and Distributed Systems 23 (3), 547-555, 2011 | 93 | 2011 |
Accuracy characterization of cell tower localization J Yang, A Varshavsky, H Liu, Y Chen, M Gruteser Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010 | 92 | 2010 |
Authenticating users through fine-grained channel information H Liu, Y Wang, J Liu, J Yang, Y Chen, HV Poor IEEE Transactions on Mobile Computing 17 (2), 251-264, 2017 | 88 | 2017 |