Sitemap
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
project
Integrated Sensing and Communication
Radio signals, traditionally used for data communication, are now emerging as sensing media. Researchers have demonstrated the great potential of RF sensing, including understanding gesture commands and monitoring vital signs. However, sensing and communication are contradictory purposes. For sensing purposes, we use a known sequence to probe unknown channel conditions, while for communication purposes, we decode unknown messages assuming that the channel conditions are known. We address the challenges encountered when integrating sensing and communication functions and thus they can work in harmony. Accordingly, we build up prototypes to test the performance of our design.
Intelligent Sensing
We investigate how to fully exploit RF signals (Wi-Fi, mmWave, Ultra-wideband), acoustic signals, and visible/invisible light signals to achieve intelligent sensing. We are interested in gesture recognition, motion tracking, food intake logging, and vital sign monitoring, so that we can enable convenient human-computer interactions, location-based services, and long-term health management. We are working toward the vision of smart homes and smart healthcare. We have built several sensing prototypes for various purposes.
Security in the era of IoT
Various intelligent devices are connected by wireless links. As wireless signals are broadcast signals, they can be easily eavesdropped by malicious guys. Besides, the miniaturized design paradigm also leave loopholes in the devices. We focus on studying the security issues in IoT devices/IoT networks, and propose corresponding coutermeasures. In addition to the inherent design deficiency, we also investigate the vulnerability in signal processing flows.
publications
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Spring: A strategy-proof and privacy preserving spectrum auction mechanism
Published in 2013 Proceedings IEEE INFOCOM, 827-835, 2013, 2013
The problem of dynamic spectrum redistribution has been extensively studied in recent years. Auction is believed to be one of the most effective tools to solve this problem. A great number of strategy-proof auction mechanisms have been proposed to improve spectrum allocation efficiency by stimulating bidders to truthfully reveal their valuations of spectrum, which are the private information of bidders. However, none of these approaches protects bidders’ privacy. In this paper, we present SPRING, which is the first Strategy-proof and PRivacy preservING spectrum auction mechanism. We not only rigorously prove the properties of SPRING, but also extensively evaluate its performance. Our evaluation results show that SPRING achieves good spectrum redistribution efficiency with low overhead.
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Towards privacy preservation in strategy-proof spectrum auction mechanisms for noncooperative wireless networks
Published in IEEE/ACM Transactions on Networking 23 (4), 1271-1285, 2014, 2014
The problem of dynamic spectrum redistribution has been extensively studied in recent years. Auctions are believed to be among the most effective tools to solve this problem. A great number of strategy-proof auction mechanisms have been proposed to improve spectrum allocation efficiency by stimulating bidders to truthfully reveal their valuations of spectrum, which are the private information of bidders. However, none of these approaches protects bidders’ privacy. In this paper, we present PRIDE, which is a PRIvacy-preserving anD stratEgy-proof spectrum auction mechanism. PRIDE guarantees k-anonymity for both single- and multiple-channel auctions. Furthermore, we enhance PRIDE to provide l-diversity, which is an even stronger privacy protection than k-anonymity. We not only rigorously prove the economic and privacy-preserving properties of PRIDE, but also extensively evaluate its performance. Our …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
A general privacy-preserving auction mechanism for secondary spectrum markets
Published in IEEE/ACM Transactions on Networking 24 (3), 1881-1893, 2015, 2015
Auctions are among the best-known market-based tools to solve the problem of dynamic spectrum redistribution. In recent years, a good number of strategy-proof auction mechanisms have been proposed to improve spectrum utilization and to prevent market manipulation. However, the issue of privacy preservation in spectrum auctions remains open. On the one hand, truthful bidding reveals bidders’ private valuations of the spectrum. On the other hand, coverage/interference areas of the bidders may be revealed to determine conflicts. In this paper, we present PISA, which is a PrIvacy preserving and Strategy-proof Auction mechanism for spectrum allocation. PISA provides protection for both bid privacy and coverage/interference area privacy leveraging a privacy-preserving integer comparison protocol, which is well applicable in other contexts. We not only theoretically prove the privacy-preserving properties of …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
TRADE: A truthful online combinatorial auction for spectrum allocation in cognitive radio networks
Published in Wireless Communications and Mobile Computing 15 (9), 1320-1330, 2015, 2015
Auctions have been shown to be able to tackle the problem of spectrum scarcity effectively, but most of existing works only focus on static scenarios. They cannot deal with the requests of spectrum users as they arrive and leave dynamically. Bidders can either cheat by bidding untruthfully or cheat about the arrival and departure time. In this paper, we model the radio spectrum allocation problem as a sealed‐bid online combinatorial auction and propose a truthful mechanism called TRADE. TRADE is a truthful and an individual rational mechanism with polynomial time complexity. It can prevent bidders from cheating in the auction while achieving good bidder satisfaction, spectrum utilization, and social welfare. Copyright © 2013 John Wiley & Sons, Ltd.
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Battery-free sensing platform for wearable devices: The synergy between two feet
Published in IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, 2016, 2016
Recent years have witnessed the prevalence of wearable devices. Wearable devices are intelligent and multifunctional, but they rely heavily on batteries. This greatly limits their application scope, where replacement of battery or recharging is challenging or inconvenient. We note that wearable devices have the opportunity to harvest energy from human motion, as they are worn by the people as long as being functioning. In this study, we propose a battery-free sensing platform for wearable devices in the form-factor of shoes. It harvests the kinetic energy from walking or running to supply devices with power for sensing, processing and wireless communication, covering all the functionalities of commercial wearable devices. We achieve this goal by enabling the whole system running on the harvested energy from two feet. Each foot performs separate tasks and two feet are coordinated by ambient backscatter …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Your glasses know your diet: Dietary monitoring using electromyography sensors
Published in IEEE Internet of Things Journal 4 (3), 705-712, 2017, 2017
Dietary monitoring can provide valuable information for disease diagnosis, body weight control, and dietary habit management, and thus it is welcomed by patients, dieters, and nutritionists. While various techniques have been used for dietary monitoring in clinical trials and user studies, they are not ready for daily use. Existing solutions either require tedious manual recording or may impede normal daily activities. In this paper, a pair of diet-aware glasses is designed. The key idea here is that when people wear glasses, the temples of the glasses are in touch with the lower part of the temporalis muscle, one of the mastication muscles. By integrating an electromyography (EMG) sensor into glasses, the glasses can measure the muscle activity of the temporalis to detect intake-related events. This paper instantiates the idea by building a prototype equipped with an EMG sensor, a microcontroller, SD shield/card and a …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
NICScatter: Backscatter as a Covert Channel in Mobile Devices
Published in MobiCom '17: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017, 2017
Today’s mobile devices contain sensitive data, which raises concerns about data security. This paper discusses a covert channel threat on existing mobile systems. Through it, malware can wirelessly leak information without making network connections or emitting signals, such as sound, EMR, vibration, etc., that we can feel or are aware of. The covert channel is built on a communication method that we call NICScatter. NICScatter transmitter malware forces mobile devices, such as mobile phones, tablets or laptops, to reflect surrounding RF signals to covertly convey information. The operation is achieved by controlling the impedance of a device’s wireless network interface card (NIC). Importantly, the operation requires no special privileges on current mobile OSs, which allows the malware to stealthily pass sensitive data to an attacker’s nearby mobile device, which can then decode the signal and thus effectively …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Smart-U: Smart Utensils Know What You Eat
Published in IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1439-1447, 2018, 2018
Mobile sensing enables unobtrusive monitoring of our daily activities, sleep quality, breathing and heart rate, revolutionizing the health-care system. Dietary information is also a critical dimension for health management but has no convenient solution yet. In this paper, we ask whether we can track meal composition unobtrusively. We introduce Smart-U, a new utensil design that can recognize meal composition during the intake process, without user intervention or on-body instruments. Smart-U makes use of the fact that light spectra reflected by foods are dependent on the food ingredients. By analyzing the reflected light spectra, Smart-U can recognize what food is on top of the utensil. We describe the prototype design of Smart-U and the food recognition algorithm. We demonstrate that Smart-U can recognize 20 types of foods with 93 % accuracy. It can work robustly under different conditions. We envision that …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Backscatter as a Covert Channel in Mobile Devices
Published in GetMobile: Mobile Computing and Communications 22 (1), 31-34, 2018, 2018
Mobile devices, including laptops, smartphones, wearables, etc., have become essential tools in modern life. We rely on them for social activities, document processing, and health status monitoring. As these devices contain sensitive personal information, various security mechanisms, such as firewalls, traffic monitors, and information flow control systems [1], have been developed for mobile devices to prevent unauthorized data leakage.
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Toward Battery-Free Wearable Devices: The Synergy between Two Feet
Published in ACM Transactions on Cyber-Physical Systems 2 (3), 1-18, 2018, 2018
Recent years have witnessed the prevalence of wearable devices. Wearable devices are intelligent and multifunctional, but they rely heavily on batteries. This greatly limits their application scope, where replacement of battery or recharging is challenging or inconvenient. We note that wearable devices have the opportunity to harvest energy from human motion, as they are worn by the users as long as being functioning. In this article, we propose a battery-free sensing platform for wearable devices in the form factor of shoes. It harvests the kinetic energy from walking or running to supply devices with power for sensing, processing, and wireless communication, covering all the functionalities of commercial wearable devices. We achieve this goal by enabling the whole system running on the harvested energy from two feet. Each foot performs separate tasks and two feet are coordinated by ambient backscatter …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Authenticating On-Body Backscatter by Exploiting Propagation Signatures
Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies(IMWUT'18), Volume 2, Issue 3, 2018
The vision of battery-free communication has made backscatter a compelling technology for on-body wearable and implantable devices. Recent advances have facilitated the communication between backscatter tags and on-body smart devices. These studies have focused on the communication dimension, while the security dimension remains vulnerable. It has been demonstrated that wireless connectivity can be exploited to send unauthorized commands or fake messages that result in device malfunctioning. The key challenge in defending these attacks stems from the minimalist design in backscatter. Thus, in this paper, we explore the feasibility of authenticating an on-body backscatter tag without modifying its signal or protocol. We present SecureScatter, a physical-layer solution that delegates the security of backscatter to an on-body smart device. To this end, we profile the on-body propagation paths of …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
ALS-P: Light Weight Visible Light Positioning via Ambient Light Sensor
Published in IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 1306-1314, 2019, 2019
Visible light positioning (VLP) is a promising direction for indoor localization. VLP depends on Visible light communication (VLC) to receive location anchors sent by light bulbs. In order to decode high-frequency VLC signals, today’s VLP systems require the receiver to equip either rolling shutter cameras or high-frequency light sensors, which bring considerable overhead or are even unavailable on many mobile devices. This paper introduces ALS-P, a lightweight VLP approach which only requires the commercially widely available ambient light sensor (ALS). ALS is conventionally not treated as a feasible VLC receiver as its sampling rate is far less than that of VLC signals. Our basic idea is to leverage the property of frequency aliasing. Through dynamically adjusting the sampling rate of the ALS sensor, the down-converted signals can be uniquely distinguished. To realize this idea, we propose novel designs to …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Edge computing in smart homes
Published in Journal of Computer Research and Development 57 (9), 1800-1809, 2020, 2020
In recent years, smart speakers and robotic vacuum cleaners have played important roles in many people’s daily life. With the development in technology, more and more intelligent devices will become parts of home infrastructure, making life more convenient and comfortable for residents. When different types of specialized intelligent devices are connected and operated over the Internet, how to minimize network latency and guarantee data privacy are open issues. In order to solve these problems, edge computing in smart homes becomes the future trend.In this article, we present our research work along this direction, covering the topics on edge sensing, communication and computation.As for sensing, we focus on the pervasive sensing capability of the edge node and present our work on contactless breath monitoring; as for communication, we work on the joint design of sensing and communication, so that sensing and communication systems can work harmoniously on limited spectrum resources; as for computation, we devote our efforts to personalized machine learning at the edge, building personalized model for each individual while guaranteeing their data privacy.
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
FreeScatter: enabling concurrent backscatter communication using antenna arrays
Published in IEEE Internet of Things Journal 7 (8), 7310-7318, 2020, 2020
The design paradigm for backscatter tags is to avoid complex functionality and make tags as simple as possible. However, such a design principle leads to the prevalence of signal collision as tags cannot sense other tags’ ongoing transmissions. The high probability of tag collision will result in low overall throughput. Although there are some existing efforts to resolve tag collisions, they either require good channel conditions or can only resolve a limited number of tags as channel capacity is deficient when SNR is low. In this article, to overcome this limitation, we bring in antenna arrays to boost the channel capacity. We propose FreeScatter, which can support scalable concurrent backscatter transmission using an antenna array. FreeScatter extracts the path that signals traveled and formulates the tags’ channel coefficient using the path representations. FreeScatter further exploits the frequency agnostic property so …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Ecgadv: Generating adversarial electrocardiogram to misguide arrhythmia classification system
Published in AAAI'20: Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 3446-3453, 2020, 2020
Deep neural networks (DNNs)-powered Electrocardiogram (ECG) diagnosis systems recently achieve promising progress to take over tedious examinations by cardiologists. However, their vulnerability to adversarial attacks still lack comprehensive investigation. The existing attacks in image domain could not be directly applicable due to the distinct properties of ECGs in visualization and dynamic properties. Thus, this paper takes a step to thoroughly explore adversarial attacks on the DNN-powered ECG diagnosis system. We analyze the properties of ECGs to design effective attacks schemes under two attacks models respectively. Our results demonstrate the blind spots of DNN-powered diagnosis systems under adversarial attacks, which calls attention to adequate countermeasures.
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Joint Design of Sensing and Communication Systems for Smart Homes
Published in IEEE Network 34 (6), 191-197, 2020, 2020
With the recent advance of technologies, smart homes are no longer just the subjects of science fiction and are now becoming a reality. it is essential for a smart home to understand its residents and provide entertainment and healthcare services. Researchers have demonstrated the great potential of RF sensing in smart homes, including understanding the residents’ gesture commands and monitoring the residents’ health status unobtrusively. Although RF sensing has appealing properties, it brings congestion to wireless networks. To make the situation worse, there is an unprecedented amount of wireless traffic in smart homes. in this article, we investigate the joint design of sensing and communication systems to alleviate the strain on wireless resources. instead of designing sensing and communication systems as separate objectives, we tend to address them jointly. We discuss this issue from two directions. The …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Telling Secrets in the Light: An Efficient Key Extraction Mechanism via Ambient Light
Published in IEEE Transactions on Wireless Communications 20 (1), 186-198, 2020, 2020
Due to the benefits of small latency, low energy consumption and increased data rate, device-to-device (D2D) communication is recognized as one of the promising techniques in the 5G era. However, the distributed nature of D2D communication makes it non-trivial to generate symmetric keys for the involving parties. Many efforts have been devoted to dynamically generate cryptographic keys for D2D communication in mobile network. However, most of them have limited applicability to practical scenarios due to low key generation efficiency or limited compatibility with commercial mobile devices. In this paper, we design an ambient light based key generation approach, which works on commercial off-the-shelf mobile devices, and achieves high key generation efficiency. We observe that mobile devices (e.g., smartphones, tablets) are often equipped with ambient light sensors and devices sense different light …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Loradar: Enabling concurrent radar sensing and lora communication
Published in IEEE Transactions on Mobile Computing 21 (6), 2045-2057, 2020, 2020
Miniature radar has demonstrated its great potential in smart homes, such as understanding the wellness of the residents and providing ubiquitous interactions. While it has many promising applications, it also results in congested RF (radio frequency) environments as there is an unprecedented amount of traffic in a smart home. To ease the strain on the limited spectrum, we ask the question that, can we reuse the sensing signals for data communication? With such a capability, we can improve the spectrum utilization by sharing the spectrum between sensing and communication systems. However, radar signals are customized for the sensing purpose and are incompatible with legacy communication standards. To address this challenge, we have an observation that, non-linearity effect in RF circuits can convert wideband radar signals into a LoRa signal. Based on this observation, in this paper, we present LoRadar …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Acoustic Strength-based Motion Tracking
Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies(IMWUT'20), Volume 4, Issue 4, 2020
Accurate device motion tracking enables many applications like Virtual Reality (VR) and Augmented Reality (AR). To make these applications available in people’s daily life, low-cost acoustic-based motion tracking methods are proposed. However, existing acoustic-based methods are all based on distance estimation. These methods measure the distance between a speaker and a microphone. With a speaker or microphone array, it can get multiple estimated distances and further achieve multidimensional motion tracking. The weakness of distance-based motion tracking methods is that they need large array size to get accurate results. Some systems even require an array larger than 1 m. This weakness limits the adoption of existing solutions in a single device like a smart speaker. To solve this problem, we propose Acoustic Strength-based Angle Tracking (ASAT) System and further implement a motion tracking …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Context-Aware Wireless-Based Cross-Domain Gesture Recognition
Published in IEEE Internet of Things Journal 8 (17), 13503-13515, 2021, 2021
Recently, significant efforts have been made to enable WiFi-based gesture recognition. However, models trained with data collected from specific domain suffer from significant performance degradation when applied in a new domain. In practice, various WiFi sensing techniques have provided us with a full knowledge of domain information including discrete variables, i.e., environment and subject, as well as continuous variables, i.e., location and orientation. Previous works haven’t fully explored these domain information or need to integrate substantial links’ information to use them. Intuitively, we can boost gesture recognition accuracy by accounting for all these domain information with different properties. We propose a new framework not being restricted to link number which combines an adversarial learning scheme with feature disentanglement modules. They together conduct two-stage alignment between …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
MousePath: Enhancing PC Web Pages through Smartphone and Optical Mouse
Published in PerCom'21: IEEE International Conference on Pervasive Computing and Communications, 2021, 2021
This paper proposes MousePath, a novel lightweight communication system between PC web pages and smartphones. MousePath works by putting the optical mouse on top of the smartphone’s screen, then its transmission starts and is instantly finished without association and pairing friction. It encodes data into the movement of smartphone’s display content and leverages the optical mouse of the computer to sense the movement for decoding the data. We prototype and evaluate the system with commercial computers and smartphones. A key benefit of MousePath is that it can be seamlessly integrated into web pages. Two representative web applications, i.e., sensor sharing and message sharing, have been developed to demonstrate MousePath’s potential in enhancing PC web page functionalities.
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
SecurePilot: Improving Wireless Security of Single-Antenna IoT Devices
Published in IEEE Internet of Things Journal 9 (2), 1148-1158, 2021, 2021
With the arrival of the Internet of Things era, IoT devices and the services built on them make our lives more convenient and also raise public concerns on their vulnerability to attacks. Recent literature advocates physical-layer solutions to help IoT devices detect attacks instead of using sophisticated cryptographic methods. However, there is still no satisfying solutions for IoT devices with a single antenna and sparse traffic. Thus, we introduce SecurePilot to fill this gap. SecurePilot is an unsupervised and plug-and-play solution which works without an attacker’s knowledge in advance. It leverages the strengths of two orthogonal physical-layer information, propagation signatures and device signatures embedded in pilot signals to enable effective attack detection. It could work on single-antenna IoT devices with sparse traffic and also work compatibly with communication protocols. The experimental results show that …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Securing IoT devices by exploiting backscatter propagation signatures
Published in IEEE Transactions on Mobile Computing 21 (12), 4595-4608, 2021, 2021
The low-power radio technologies open up many opportunities to facilitate Internet-of-Things (IoT) into our daily life, while their minimalist design also makes IoT devices vulnerable to many active attacks. Recent advances use an antenna array to extract fine-grained physical-layer signatures to identify the attackers, which adds burdens in terms of energy and hardware cost to IoT devices. In this paper, we present ShieldScatter, a lightweight system that attaches low-cost tags to single-antenna devices to shield the system from active attacks. The key insight of ShieldScatter is to intentionally create multi-path propagation signatures with the careful deployment of tags. These signatures can be used to construct a sensitive profile to identify the location of the signals’ arrival, and thus detect the threat. In addition, we also design a tag-random scheme and a multiple receivers combination approach to detect a powerful …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Shared Secret Key Generation by Exploiting Inaudible Acoustic Channels
Published in ACM Transactions on Sensor Networks (TOSN) 18 (1), 1-26, 2021, 2021
To build a secure wireless networking system, it is essential that the cryptographic key is known only to the two (or more) communicating parties. Existing key extraction schemes put the devices into physical proximity and utilize the common inherent randomness between the devices to agree on a secret key, but they often rely on specialized hardware (e.g., the specific wireless NIC model) and have low bit rates. In this article, we seek a key extraction approach that only leverages off-the-shelf mobile devices, while achieving significantly higher key generation efficiency. The core idea of our approach is to exploit the fast varying inaudible acoustic channel as the common random source for key generation and wireless parallel communication for exchanging reconciliation information to improve the key generation rate. We have carefully studied and validated the feasibility of our approach through both theoretical …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
SMART: screen-based gesture recognition on commodity mobile devices
Published in MobiCom '21: Proceedings of the 27th Annual International Conference on Mobile Computing and Networking, 2021, 2021
In-air gesture control extends a touch screen and enables contact-less interaction, thus has become a popular research direction in the past few years. Prior work has implemented this functionality based on cameras, acoustic signals, and Wi-Fi via existing hardware on commercial devices. However, these methods have low user acceptance. Solutions based on cameras and acoustic signals raise privacy concerns, while WiFi-based solutions are vulnerable to background noise. As a result, these methods are not commercialized and recent flagship smartphones have implemented in-air gesture recognition by adding extra hardware on-board, such as mmWave radar and depth camera. The question is, can we support in-air gesture control on legacy devices without any hardware modifications? To answer this question, in this work, we propose SMART, an in-air gesture recognition system leveraging the screen and …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Augmented Adversarial Learning for Human Activity Recognition with Partial Sensor Sets
Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT'22), Volume 6, Issue 3, Article No.122, pp 1–30, 2022
Human activity recognition (HAR) plays an important role in a wide range of applications, such as health monitoring and gaming. Inertial sensors attached to body segments constitute a critical sensing system for HAR. Diverse inertial sensor datasets for HAR have been released with the intention of attracting collective efforts and saving the data collection burden. However, these datasets are heterogeneous in terms of subjects and sensor positions. The coupling of these two factors makes it hard to generalize the model to a new application scenario, where there are unseen subjects and new sensor position combinations. In this paper, we design a framework to combine heterogeneous data to learn a general representation for HAR, so that it can work for new applications. We propose an Augmented Adversarial Learning framework for HAR (AALH) to learn generalizable representations to deal with diverse …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
WISE: Low-Cost Wide Band Spectrum Sensing Using UWB
Published in SenSys '22: Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022, 2022
Spectrum sensing plays a crucial role in spectrum monitoring and management. However, due to the expensive cost of high-speed ADCs, wideband spectrum sensing is a long-standing challenge. In this paper, we present how to transform Ultra-wideband (UWB) devices into a spectrum sensor which can provide wideband spectrum monitoring at a low cost. Compared with the expensive high-speed ADCs which cost at least hundreds of dollars, a UWB device is only several dollars. As the low-cost UWB technology is not originally designed for spectrum sensing, we address the inherent limitations of low-cost devices such as limited memory, low SPI speed and low accuracy, and show how to obtain spectrum occupancy information from the noisy and spurious UWB channel impulse response. In this paper, we present WISE, which not only can give accurate channel occupancy information, but also can precisely …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Side-lobe Can Know More: Towards Simultaneous Communication and Sensing for mmWave
Published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT'23), Volume 6, Issue 4, 2023
Thanks to the wide bandwidth, large antenna array, and short wavelength, millimeter wave (mmWave) has superior performance in both communication and sensing. Thus, the integration of sensing and communication is a developing trend for the mmWave band. However, the directional transmission characteristics of the mmWave limits the sensing scope to a narrow sector. Existing works coordinate sensing and communication in a time-division manner, which takes advantage of the sector level sweep during the beam training interval for sensing and the data transmission interval for communication. Beam training is a low frequency (e.g., 10Hz) and low duty-cycle event, which makes it hard to track fast movement or perform continuous sensing. Such time-division designs imply that we need to strike a balance between sensing and communication, and it is hard to get the best of both worlds. In this paper, we try to …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Rethinking Privacy Risks from Wireless Surveillance Camera
Published in ACM Transactions on Sensor Networks (TOSN) 19 (3), 1-21, 2023, 2023
Wireless home surveillance cameras are gaining popularity in elderly/baby care and burglary detection in an effort to make our life safer than ever before. However, even though the camera’s traffic is encrypted, attackers can still infer what the residents are doing at home. Although this security loophole has been reported, it does not attract much attention from the public, as it requires the attacker to be in close proximity to the camera and have some prior knowledge about the victims. Due to these requirements, the attacker has a low chance of success in the real world. In this article, we argue that the capability of attackers has been greatly underestimated. First, the attacker can leverage the characteristics of video transport protocols to recover the metadata of missing packets. Second, the attacker can build the inference model using the public datasets and adapt the model to the real traffic.
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
MousePath: Lightweight phone-to-web information sharing via mouse interface
Published in Pervasive and Mobile Computing 90, 101756, 2023, 2023
This paper proposes MousePath, a novel lightweight communication system between PC web pages and smartphones. MousePath works in two modalities, MousePath-OPT and MousePath-BL. MousePath-OPT works by putting the optical mouse on top of the smartphone’s screen, then its transmission starts and instantly finishes without association and pairing fraction. It encodes data into the movement of the smartphone’s display content and leverages the optical mouse of the computer to sense the movement for decoding the data. MousePath-BL works by emulating the smartphone as a Bluetooth wireless mouse. Then the smartphone can directly transmit information to the web page via generating mouse events. We prototype and evaluate the system with commercial computers and smartphones. A key benefit of MousePath is that it seamlessly bridges smartphones to co-located PC web applications …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
BabyNutri: A Cost-Effective Baby Food Macronutrients Analyzer Based on Spectral Reconstruction
Published in IMWUT'23: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Volume 7, Issue 1, 2023
The physical and physiological development of infants and toddlers requires the proper amount of macronutrient intake, making it an essential problem to estimate the macronutrient in baby food. Nevertheless, existing solutions are either too expensive or poor performing, preventing the widespread use of automatic baby nutrient intake logging. To narrow this gap, this paper proposes a cost-effective and portable baby food macronutrient estimation system, BabyNutri. BabyNutri exploits a novel spectral reconstruction algorithm to reconstruct high-dimensional informative spectra from low-dimensional spectra, which are available from low-cost spectrometers. We propose a denoising autoencoder for the reconstruction process, by which BabyNutri can reconstruct a 160-dimensional spectrum from a 5-dimensional spectrum. Since the high-dimensional spectrum is rich in light absorption features of macronutrients, it …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
CSI-StripeFormer: Exploiting Stripe Features for CSI Compression in Massive MIMO System
Published in IEEE INFOCOM 2023-IEEE Conference on Computer Communications, 1-10, 2023, 2023
The massive MIMO gain for wireless communication has been greatly hindered by the feedback overhead of channel state information (CSI) growing linearly with the number of antennas. Recent efforts leverage the DNN-based encoder-decoder framework to exploit correlations within the CSI matrix for better CSI compression. However, existing works have not fully exploited the unique features of CSI, resulting in an unsatisfactory performance under high compression ratios and sensitivity to multipath effects. Instead of treating CSI as common 2D matrices like images, we reveal the intrinsic stripe-based correlation across the CSI matrix. Driven by this insight, we propose CSI-StripeFormer, a stripe-aware encoder-decoder framework to exploit the unique stripe feature for better CSI compression. We design a lightweight encoder with asymmetric convolution kernels to capture various shape features. We further …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Step and Save: A Wearable Technology Based Incentive Mechanism for Health Insurance
Published in APPT'23: International Symposium on Advanced Parallel Processing Technologies, 326-347, 2023, 2023
The market of wearables are growing explosively for the past few years. The majority of the devices are related to health care and fitness. It is embarrassing that users easily lose interest in these devices, and thus fail to improve health condition. Recently, the “be healthy and be rewarded” programs are gaining popularity in health insurance market. The insurance companies give financial rewards to its policyholders who take the initiative to keep healthy. It provides the policyholders with incentives to lead a healthier lifestyle and the insurer can also benefit from less medical claims. Unfortunately, there are hardly any studies discussing how to design the incentive mechanism in this new emerging health promotion program. Improper design would not change policyholders’ unhealthy behavior and the insurer cannot benefit from it. In this paper, we propose a mechanism for this health promotion program. We model it as …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
RIScan: RIS-aided Multi-user Indoor Localization Using COTS Wi-Fi
Published in Sensys'23: Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, 2023, 2023
Multi-user indoor localization is considered to be one of the most useful wireless applications. Low latency and high robustness to dynamic interference from surrounding people are essential requirements for multi-user localization. However, state-of-the-art (SOTA) indoor localization systems cannot satisfy both requirements at the same time. In this paper, we propose RIScan, a Reconfigurable Intelligent Surface (RIS)-aided localization system that can achieve both low latency and high reliability. We leverage RIS to perform Wi-Fi beam scanning so all clients can figure out their direction in a single scan. However, compared with traditional AP-based systems, the introduction of RIS creates a more complicated signal superposition at the receiver, preventing clients from directly obtaining target beams for direction derivation and localization. To overcome this challenge, we fully utilize the reconfigurability of RIS to …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Spectrum Sensing Everywhere: Wide-Band Spectrum Sensing With Low-Cost UWB Nodes
Published in IEEE/ACM Transactions on Networking, Volume 32, Issue 3, June 2024, 2023
Spectrum sensing plays a crucial role in spectrum monitoring and management. However, due to the expensive cost of high-speed ADCs, wideband spectrum sensing is a long-standing challenge. In this paper, we present how to transform Ultra-wideband (UWB) devices into a spectrum sensor which can provide wideband spectrum monitoring at a low cost. Compared with the expensive high-speed ADCs which cost at least hundreds of dollars, a UWB device is only several dollars. As the low-cost UWB technology is not originally designed for spectrum sensing, we address the inherent limitations of low-cost devices such as limited memory, low SPI speed and low accuracy, and show how to obtain spectrum occupancy information from the noisy and spurious UWB channel impulse response. In this paper, we present, which not only can give accurate channel occupancy information, but also can precisely estimate the …
![](https://huangqy89.github.io/cn-2024/_images/logo.png)
Gesture Recognition Using Visible Light on Mobile Devices
Published in IEEE/ACM Transactions on Networking, 2024, 2024
In-air gesture control extends a touch screen and enables contactless interaction, thus has become a popular research direction in the past few years. Prior work has implemented this functionality based on cameras, acoustic signals, and Wi-Fi via existing hardware on commercial devices. However, these methods have low user acceptance. Solutions based on cameras and acoustic signals raise privacy concerns, while WiFi-based solutions are vulnerable to background noise. As a result, these methods are not commercialized and recent flagship smartphones have implemented in-air gesture recognition by adding extra hardware on-board, such as mmWave radar and depth camera. The question is, can we support in-air gesture control on legacy devices without any hardware modifications? To answer this question, in this work, we propose, an in-air gesture recognition system leveraging the screen and ambient light …
services
student
Hengxin Wu
Master, SUSTech, 2021.09-2024.06
Jie Xiao
Master, SYSU, 2024.09-
Jilong Du
Master, SYSU, 2023.09-
Junlin Lv
Master, SYSU, 2024.09-
Qian Yang
(Master, SUSTech) Intern student, 2020.06-2022.07
Qian Yang
Ph.D., co-supervision, SUSTech & Peng Cheng Laboratory, 2022.09-
Xuwang Zeng
Master, SYSU, 2023.09-
Yechun Ruan
Master, SUSTech, 2022.09-
Yihang Zhang
Master, SYSU, 2024.09-
Yongtao Dai
Master, SYSU, 2023.09-
Youjing Lu
(Ph.D., SJTU) Intern student, 2019.11-2020.08
Yutong Xu
Master, SYSU, 2024.09-
Zhicheng Luo
Ph.D., co-supervision, SYSU, 2023.09-
Zhicheng Luo
Master, SUSTech, 2020.09-2023.06
Zilin Ye
Master, SYSU, 2023.09-
Zimo Liao
(Ph.D., SJTU) Intern student, 2020.10-2021.03
talks
teaching
Advanced Computer Networks
Postgraduate Courses, , 2023
Digital Circuit and Logic Design
Undergraduate course, , 2024
Computer Networks
Undergraduate course, , 2024
This course offers an in-depth exploration of computer networks, adopting a top-down approach to present the fundamental concepts and principles. Beginning with application-layer protocols, such as HTTP, FTP, and DNS, the course progressively delves into transport, network, and link-layer mechanisms, including TCP/IP, routing algorithms, and data link technologies. Through this approach, students will gain a holistic understanding of how the Internet functions, from high-level applications to low-level data transmission.