Data Analysis and Information SecuritY (DAISY) Lab

Refereed Conference Papers
2024
174. | Clean & Compact: Efficient Data-Free Backdoor Defense with Model Compactness
Huy Phan, Jinqi Xiao, Yang Sui, Tianfang Zhang, Cong Shi, Yan Wang, Yingying Chen, Bo Yuan |
173. | SAFARI: Speech-Associated Facial Authentication for AR/VR Settings via Robust VIbration Signatures
Tianfang Zhang, Qiufan Ji, Zhengkun Ye, Md Mojibur Rahman Redoy Akanda, Ahmed Tanvir Mahdad, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen |
172. | CasePad: Privacy-preserving Finger Activity Sensing via Passive Acoustic Signals Enhanced by Mini-Structures in Smartphone Cases
Zhengkun Ye, Yan Wang, Yingying Chen |
171. | Inaudible Backdoor Attack via Stealthy Frequency Trigger Injection in Audio Spectrogram
Tianfang Zhang, Huy Phan, Zijie Tang, Cong Shi, Yan Wang, Bo Yuan, Yingying Chen |
170. | Practical Adversarial Attack on WiFi Sensing Through Unnoticeable Communication Packet Perturbation
Changming Li, Mingjing Xu, Yicong Du, Limin Liu, Cong Shi, Yan Wang, Hongbo Liu, Yingying Chen |
169. | TouchTone: Smartwatch Privacy Protection via Unobtrusive Finger Touch Gestures
Yilin Yang, Yan Wang, Yingying Chen, Zhengkun Ye, Xin Li, Zhiliang Xia, Yanzhi Ren |
168. | RFSpy: Eavesdropping on Online Conversations with Out-of-Vocabulary Words by Sensing Metal Coil Vibration of Headsets Leveraging RFID
Yunzhong Chen, Jiadi Yu, Yingying Chen, Linghe Kong, Yanmin Zhu, Yi-Chao Chen |
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
Refereed Workshop Papers, Posters, and Demos
39. | Poster Abstract: A Vision-based Approach for Commodity WiFi
Jie Yang, Yili Ren, Yili Ren, Yingying Chen, Yichao Wang
|
38. | Poster: Fingerprint-Face Friction Based Earable Authentication
Zi Wang, Yilin Wang, Yingying Chen, Jie Yang
|
37. | Poster: Person Re-Identification Using WiFi Signals
Jie Yang, Yili Ren, Sheng Tan, Yili Ren, Yingying Chen, Yichao Wang
|
36. | Poster: A Non-intrusive and Adaptive Speaker De-Identification Scheme Using Adversarial Examples
Feng Lin, Jiadi Yu, Kui Ren, Li Lu, Meng Chen, Yingying Chen, Zhongjie Ba
|
35. | Poster: A WiFi Vision-based 3D Human Mesh Reconstruction
Jie Yang, Yili Ren, Yichao Wang, Yingying Chen, Yichao Wang
|
34. | Poster: Personalized Health Monitoring via Vital Sign Measurements Leveraging Motion Sensors on AR/VR Headsets
Tianfang Zhang, Cong Shi, Tianming Zhao, Zhengkun Ye, Payton Walker, Nitesh Saxena, Yan Wang, Yingying Chen
|
33. | Poster: Continuous Blood Pressure Monitoring Using Low-cost Motion Sensors on AR/VR Headsets
Tianming Zhao, Zhengkun Ye, Tianfang Zhang, Cong Shi, Ahmed Tanvir Mahdad, Yan Wang, Yingying Chen, Nitesh Saxena
|
32. | Poster: Speech Privacy Attack via Vibrations from Room Objects Leveraging a Phased-MIMO Radar
Cong Shi, Tianfang Zhang, Zhaoyi Xu, Shuping Li, Yichao Yuan, Athina Petropulu, Chung Tse Michael Wu, Yingying Chen
|
31. | Poster: Tracking Free-form Activity Using WiFi Signals
Yili Ren, Zi Wang, Sheng Tan, Yingying Chen, Jie Yang
|
30. | Poster: Non-invasive Tooth Gestures Acoustics User Authentication Based on Multi-level Biometrics Using Earables
Zi Wang, Yili Ren, Yingying Chen, Jie Yang,
|
29. | Poster: 3D Human Pose Estimation Using WiFi Signals
Yili Ren, Zi Wang, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang,
|
28. | Demo: Device-free Activity Monitoring Through Real-time Analysis on Prevalent WiFi Signals
Cong Shi, Justin Esposito, Sachin Mathew, Amit Patel, Rishika Sakhuja, Jian Liu, Yingying Chen,
|
27. | Demo: Hands-Free Human Activity Recognition Using Millimeter-Wave Sensors
Soo Min Kwon, Song Yang, Jian Liu, Xin Yang, Wesam Saleh, Shreya Patel, Christine Mathews, Yingying Chen,
|
26. | Demo: Monitoring Movement Dynamics of Robot Cars and Drones Using Smartphone's Built-in Sensors
Yang Bai, Xin Yang, ChenHao Liu, Justin Wain, Ryan Wang, Jeffery Cheng, Chen Wang, Jian Liu, Yingying Chen,
|
25. | Demo: Toward Continuous User Authentication Using PPG in Commodity Wrist-worn Wearables
Tianming Zhao, Yan Wang, Jian Liu, Yingying Chen,
|
24. | Poster: Video Chat Scam Detection Leveraging Screen Light Reflection
Hongbo Liu, Zhihua Li, Yucheng Xie, Ruizhe Jiang, Yan Wang, Xiaonan Guo, Yingying Chen,
|
23. | Poster: Inaudible High-throughput Communication Through Acoustic Signals
Yang Bai, Jian Liu, Yingying Chen, Li Lu, Jiadi Yu, Best Poster Award Runner-up, Winner of Student Research Competition (SRC) |
22. | Poster: Leveraging Breathing for Continuous User Authentication
Jian Liu, Yudi Dong, Yingying Chen, Yan Wang, Tianming Zhao,
|
21. | Poster: Inferring Mobile Payment Passcodes Leveraging Wearable Devices
Chen Wang, Jian Liu, Xiaonan Guo, Yan Wang, Yingying Chen,
|
20. | Poster: Your Phone Tells Us The Truth: Driver Identification Using Smartphone on One Turn
Fatemeh Tahmasbi, Yan Wang, Yingying Chen, Marco Gruteser,
|
19. | Poster: Your Heart Won't Lie: PPG-based Continuous Authentication on Wrist-worn Wearable Devices
Tianming Zhao, Yan Wang, Jian Liu, Yingying Chen,
|
18. | Poster: Sensing on Ubiquitous Surfaces via Vibration Signals
Jian Liu, Yingying Chen, Marco Gruteser,
|
17. | Poster: PIN Number-based Authentication Leveraging Physical Vibration
Jian Liu, Chen Wang, Yingying Chen,
|
16. | Demo: VibKeyboard: Virtual Keyboard Leveraging Physical Vibration
Jian Liu, Yingying Chen, Marco Gruteser,
|
15. | Toward Detection of Unsafe Driving with Wearables
Luyang Liu, Cagdas Karatas, Hongyu Li, Sheng Tan, Marco Gruteser, Jie Yang, Yingying Chen, Richard P. Martin,
|
14. | On the Limits of Positioning-based Pedestrian Risk Awareness
Shubham Jain, Carlo Borgiattino, Yanzhi Ren, Marco Gruteser, Yingying Chen,
|
13. | A Study of Smartphone User Privacy from the Advertiser's Perspective
Yan Wang, Yingying Chen, Fan Ye, Jie Yang, Hongbo Liu,
|
12. | Measuring Human Queues Using WiFi Signals
Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, Richard P. Martin, Winner of Student Research Competition |
11. | Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen,
|
10. | Coping with Frequency-based Attacks to Secure Distributed Data Storage in Wireless Networks
Hongbo Liu, Hui Wang, Yingying Chen,
|
9. | Discovering Wormhole Attacks in Delay Tolerant Networks via Forbidden Topology Structure Identification
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen,
|
8. | Localizing Jammers in Wireless Networks
Hongbo Liu, Wenyuan Xu, Yingying Chen, Zhenhua Liu,
|
7. | Detecting Sybil Attacks in Wireless and Sensor Networks Using Cluster Analysis
Jie Yang, Yingying Chen, Wade Trappe,
|
6. | A Theoretical Analysis of Wireless Localization Using RF-based Fingerprint Matching
Jie Yang, Yingying Chen,
|
5. | Exploiting Environmental Properties for Wireless Localization
Shu Chen, Yingying Chen, Wade Trappe,
|
4. | GRAIL: General Realtime Adaptable Indoor Localization
Yingying Chen, Eiman Elnahraway, John-Austin Francisco, Konstantinos Kleisouris, Xiaoyan Li, Hongyi Xue, Richard P. Martin,
|
3. | RTBP: Real Time Bayesian Positioning System for Wireless and Sensor Networks
John-Austin Francisco, Yingying Chen, Eiman Elnahraway, Konstantinos Kleisouris, Richard P. Martin,
|
2. | Real-Time Bayesian Positioning
John-Austin Francisco, Yingying Chen, Eiman Elnahraway, Konstantinos Kleisouris, Richard P. Martin, Best Technological Innovation Award |
1. | Towards Decentralized and Secure Electronic Marketplace
Yingying Chen, Constantin Serban, Wenxuan Zhang, Naftaly Minsky,
|