Jie Yang 

 Assistant Professor

Department of Computer Science Office: 251C Love Building
Florida State University Email: jyang5 at fsu.edu
Tallahassee, FL 32306 Phone: 850-645-0417

                                                              

   

Bio Sketch | News | Honors & Awards | Publications | Projects | Teaching | Professional Activities

               I am looking for highly self-motivated PhD students starting in Spring'17 and Fall'17. If you are interested in my research area, please send me email with your CV, transcripts, TOEFL and GRE scores.


Research Interests

 My current research is funded by:

  • National Science Foundation (NSF)

  • Army Research Office (ARO)

  • Florida State University (FSU)

 

                                                 


News and Highlights

 


Honors & Awards
  • Best Paper Award, IEEE Conference on Communications and Network Security (CNS) 2014.
  • Best Paper Award - Runner-up, IEEE Conference on Communications and Network Security (CNS) 2013.
  • Best Paper Award, ACM International Conference on Mobile Computing and Networking (MobiCom), 2011.
  • Winner of ACM MobiCom Student Research Competition, 2013.
  • Spotlight Paper of the September 2012 issue of the IEEE Transactions on Mobile Computing, 2012.
  • Francis T. Boesch Award, Stevens Institute of Technology, 2011
  • Graduate Student Award, New Jersey Inventors Hall of Fame, 2011
  • ACM MobiCom Student Travel Grant, 2010, 2011
  • Outstanding Research Award, Stevens Institute of Technology, 2009
  • Best Poster Award, IEEE Wireless and Optical Communications Conference (IEEE WOCC), 2009
  • Innovation & Entrepreneurship Doctoral Fellowship, Stevens Institute of Technology, 2007~2010

●Home


Teaching

  • Spring 2016: CSI 5900 Wireless and Mobile Computing
  • Fall 2016: CIS4360 Introduction to Computer Security
  • Spring 2015: CSI 5900 Wireless and Mobile Computing
  • Fall 2014: CIS4360 Introduction to Computer Security
  • Spring 2014: CSE 232 - C++ for Programmers, CSE 142 - Intro to C Programming & Unix
  • Fall 2013: CIT 448 Information Security Practice
  • Spring 2013: CSE 232 - C++ for Programmers, CSE 142 - Intro to C Programming & Unix
  • Fall 2012: CSE/CIT 247: Introduction to Computer Networks
  • Winter 2011: CPE/EE 556: Computing Principles for Embedded Systems [ Syllabus]
  • Fall 2011: CPE/EE 556: Computing Principles for Embedded Systems [ Syllabus]


Publications 

Book

   Pervasive Wireless Environments: Detecting and Localizing User Spoofing,
   J. Yang, Y. Chen, W. Trappe, J. Cheng
   ISBN 978-3-319-07356-9, Springer, 2014.

Book Chapters

  1. Defending Against Identity-Based Attacks in Wireless Networks
    Yingying Chen and Jie Yang
    Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, Sajal Das, Krishna Kant and Nan Zhang (eds.), Morgan Kauffman, Morgan Kaufmann, ISBN: 978-0-12-415815-3, chapter 2-4, Jan., 2012.
     
  2. On the Performance of Wireless Indoor Localization Using Received Signal Strength
    Jie Yang, Yingying Chen, R. P. Martin, and M. Gruteser
    Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE Press, ISBN: 978-0-470-94342-7, chapter 12, Nov., 2011.

     
  3. Impact of Anchor Placement and Anchor Selection on Localization Accuracy
    Yingying Chen, Jie Yang, Wade Trappe and R. P. Martin
    Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE Press, ISBN: 978-0-470-94342-7, chapter 13, Nov., 2011.
     

Journal Papers and Magazine Articles

  1. Enabling Self-healing Smart Grid Through Jamming Resilient Local Controller Switching
    H. Liu, Y. Chen, M. C. Chuah, J. Yang, H. V. Poor
    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), PrePrints, doi:10.1109/TDSC.2015.2479624, 2016.
     
  2. User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems
    Y. Ren, Y. Chen, M. C. Chuah, and J. Yang
    IEEE Transactions on Mobile Computing (IEEE TMC), vol. 14, no. 9, pp.1961-1974, 2015.
     
  3. Protecting Multi-Lateral Localization Privacy in Pervasive Environments
    T. Shu, Y. Chen, J. Yang
    IEEE/ACM Transactions on Networking (IEEE/ACM ToN), 23(5): 1688-1701, 2015
     
  4. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation
    H. Liu, J. Yang, Y. Wang, Y. Chen, and C. E. Koksal
    IEEE Transactions on Mobile Computing (IEEE TMC), vol.13, no.12, pp.2820,2835,  2014.
     
  5. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
    J. Yang, Y. Chen, W. Trappe and J. Cheng,
    IEEE Transactions on Parallel & Distributed Systems
    (IEEE TPDS),  Volume 24, No.1, Pages 44-58, 2013.
     
  6. Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors
    Y. Wang, Y. Chen, J. Yang, M. Gruteser, R. P. Martin, H. Liu,
    L. Liu and C. Karatas
    IEEE Transactions on Mobile Computing (IEEE TMC), vol. 15, no. 8, pp. 1965-1981, 2016
     
  7. SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments
    J. Yu, H. Han, H. Zhu, Y. Chen, J. Yang, Y. Zhu, G. Xue and M. Li
    IEEE Transactions on Mobile Computing (IEEE TMC), vol. 15, no.1, pp. 202-216, 2016.
     
  8. A Low-Cost Wi-Fi-Based Solution for Measuring Human Queues
    Y. Wang, Y. Chen, J. Yang, H. Liu, M. Gruteser, R. P. Martin
    GetMobile: Mobile Computing and Communications, vol.19, no.1, pp.10-13,  2015.
     
  9. An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization
    X. Zheng, J. Yang, Y. Chen, and H. Xiong
    IEEE Transactions on Mobile Computing (IEEE TMC), vol.14, no.6, pp.1138-1150,  2015.
     
  10. Sensing Human Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones
    J. Yu, H. Han, H. Zhu, Y. Chen, J. Yang, G. Xue, Y. Zhu, M. Li
    IEEE Transactions on Mobile Computing (IEEE TMC), vol.14, no.8, pp.1698-1711,  2015.
     
  11. Accurate WiFi Based Localization for Smartphones Using Peer Assistance
    H. Liu, J. Yang, S. Sidhom, Y. Wang, Y. Chen and F. Ye
    IEEE Transactions on Mobile Computing (IEEE TMC), vol.13, no.10, pp.2199-2214, 2014.

     
  12. A Study of Localization Accuracy using Multiple Frequencies and Powers
    X. Zheng, H. Liu, J. Yang, Y. Chen, R. P. Martin and X. Li
    IEEE Transactions on Parallel & Distributed Systems (IEEE TPDS), Volume 25, No.8, Pages 1955-1965, 2014.
     
  13. Sensing Driver Phone Use with Acoustic Ranging Through Car Speakers
    J. Yang, S. Sidhom, G. Chandrasekaran, T. Vu, H. Liu, N. Cecan, Y. Chen, M. Gruteser and R. P. Martin
    IEEE Transactions on Mobile Computing (IEEE TMC),
    Volume11, NO.9, Pages 1426-1440, 2012.
     
  14. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks
    Y. Chen, J. Yang, W. Trappe and R. P. Martin
    IEEE Transactions on Vehicular Technology (
    IEEE TVT), vol.59, no.5, pp.2418-2434, 2010.
     
  15. Empirical Evaluation of Wireless Localization When Using Multiple Antennas
    K. Kleisouris, Y. Chen, J. Yang and R. P. Martin
    IEEE Transactions on Parallel and Distributed Systems
    (IEEE TPDS), vol.21, no.11, pp.1595-1610, 2010.
     
  16. DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices
    G. Chandrasekaran, Mesut Ergin, Marco Gruteser, Rich Martin, Jie Yang and Yingying Chen
    IEEE Transactions on Mobile Computing
    (
    IEEE TMC), vol. 8, no. 12, pp. 1663-1675, 2009.
     
  17. Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones
    Y. Ren, J. Yang, M. C. Chuah, and Y. Chen
    Ad Hoc & Sensor Wireless Networks (AHSWN),
    Vol. 27, no. 1-2, pp. 51-73, 2015.
     
  18. Achieving Robust Wireless Localization Resilient to Signal Strength Attacks
    X. Li, Y. Chen, J. Yang, X, Zheng
    Wireless Networks (WINET), Springer, Volume 18, Issue 1, Page 45-58
    , 2012.
     
  19. Towards Attack Resistant Localization under Infrastructure Attacks
    J. Yang and Y. Chen
    Security and Communication Networks (SCN), Wiley, DOI: 10.1002/sec.323,
    Volume 5, No.4, Pages 384-403, 2012.
     
  20. A Social Community Based Approach for Reducing the Propagation of Infectious Diseases in Healthcare
    Jie Yang, Yanzhi Ren, Yingying Chen and M. C. Chuah
    ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Vol. 14, Issue 3, Pages 7 -9, 2010.
     
  21. Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments
    Jie Yang and Yingying Chen and Jerry Cheng
    Ad Hoc & Sensor Wireless Networks (AHSWN),
    vol.11 , no.3-4 , pp.307-329, 2011
    .
     
  22. Detecting Wormhole Attacks in Delay Tolerant Networks
    Yanzhi Ren, M. C. Chuah, Jie Yang and Yingying Chen
    IEEE Wireless Communications Magazine
    (IEEE WCM), vol.17, no.5, pp.36-42, October 2010.
  23. A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks
    Yingying Chen, Wang Hui, Xiuyuan Zheng and Jie Yang,
    EURASIP Journal on Wireless Communications and Networking
    (JWCN),
    vol. 2010 (319275)
    ,

    wordpress stats plugin
    , Jun. 2010.

  24. Fast object recognition using local scale-invariant features
    Zhiqian Zhou, Bo Wang, Jie Yang, and Ji Lu
    Optical Technique, vol. 34, no. 5, pp. 742 C 745, 2008.

Selected Conference Publications

  1. VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones
    H. Zhang, S. Tan, J. Yang, Y. Chen
    Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS 2016), Vienna, Austria, October, 2016. (Acceptance rate: 137/831 = 16.5%)
     
  2. WiFinger: Leveraging Commodity WiFi for Fine-grained Finger Gesture Recognition
    S. Tan and J. Yang
    Proceedings of the Seventeenth International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2016), Paderborn, Germany, July, 2016. (Acceptance rate: 35/187 = 18.7%)
     
  3. Leveraging Wearables for Steering and Driver Tracking
    C. Karatas, L. Liu, H. Li, J. Liu, Y. Wang, S. Tan, J. Yang, Y. Chen, M. Gruteser, R. Martin
    Proceedings of IEEE International Conference on Computer Communications (INFOCOM 2016), San Francisco, USA, April 2016. (Acceptance rate: 300/1644 = 18.25%)
     
  4. Snooping Keystrokes with mm-level Audio Ranging on a Single Phone
    J. Liu, Y. Wang, G. Kar, Y. Chen, J. Yang, M. Gruteser
    Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom 2015), Paris, France, September 2015. (Acceptance rate: 38/207 = 18.4%) .
     
  5. Towards Understanding the Advertiser's Perspective of Smartphone User Privacy
    Y. Wang, Y. Chen, F. Ye, J. Yang, H. Liu
    Proceedings of the 35th IEEE International Conference on Distributed Computing System (ICDCS 2015), Columbus, Ohio, June 2015. (Acceptance rate: 70/543 = 12.8%)
     
  6. Critical Segment Based Real-time E-Signature for Securing Mobile Transactions
    Y. Ren, C. Wang, Y. Chen, M. C. Chuah, J. Yang
    Proceedings of the IEEE Conference on Communications and Network Security (CNS 2015), Florence, Italy, 2015.
     
  7. Sensing Ambient Light for User Experience-Oriented Color Scheme Adaptation on Smartphone Displays
    J. Yu, J. Zhao, Y. Chen, J. Yang
    Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems (SenSys 2015), Seoul, South Korea, November 2015.(Acceptance rate: 27/132 = 20%)
     
  8. Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi
    J. Liu, Y. Wang, Y. Chen, J. Yang, X. Chen, J. Cheng
    Proceedings of the 16th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2015), Hangzhou, China, June 2015. (Acceptance rate: 37/250 = 14.8%).
     
  9. Fine-grained Sleep Monitoring: Hearing Your Breathing with Smartphones
    Y. Ren, C. Wang, J. Yang, Y. Chen
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2015), Hong Kong, China, April 2015. (Acceptance rate: 316/1640 = 19%).
     
  10. Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information
    X. Zheng, W. Chen, Y. Chen, J. Yang
    Proceedings of the 2nd IEEE Conference on Communications and Network Security (CNS 2014), October, San Francisco, CA, 2014 -
    Best Paper Award
     
  11. Practical User Authentication Leveraging Channel State Information
    H. Liu, Y. Wang, J. Liu, J. Yang and Y. Chen
    Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, June 2014. (Acceptance rate: 52/260 = 20%)
     
  12. Multi-lateral Privacy-Preserving Localization in Pervasive Environments
    T. Shu, Y. Chen, J. Yang and A. Williams
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2014), Toronto, Canada, April 2014. (Acceptance rate: 19%)

     
  13. E-eyes: Device-free Location-oriented Activity Identification Using Fine-grained WiFi Signatures
    Y. Wang, J. Liu, Y. Chen, M. Gruteser, J. Yang, H. Liu
    Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom 2014), Maui, Hawii, Sept. 2014. (Acceptance rate:  36/220 = 16.4%)

     
  14. Tracking Human Queues Using Single-Point Signal Monitoring
    Y. Wang, J. Yang, Y. Chen, H. Liu, M. Gruteser, R. P. Martin
    Proceedings of the 12th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2014), New Hampshire, USA, June 2014.(Acceptance rate: 25/185 = 13.5%)
     
  15. SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments
    H. Han, J. Yu, H. Zhu, Y. Chen, Jie Yang, G. Xue, Y. Zhu, M. Li
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2014), Toronto, Canada, April 2014. (Acceptance rate: 19%)
     
  16. Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming
    H. Liu, Y. Chen, M. C. Chuah, J. Yang
    Proceedings of IEEE Conference on Communications and Network Security (CNS 2013), Washington, D.C., USA, October 2013. -
    Best Paper Award - Runner-up
     
  17. Smartphone Based User Verification Leveraging Gait Recognition for Mobile Healthcare Systems
    Y. Ren, Y. Chen, M. C. Chuah and J. Yang
    Proceedings of the the 10th Annual IEEE Communications Society Conference on Sensing and Communication in Wireless Networks (SECON 2013), New Orleans, USA
     
  18. Fast and Practical Secret Key Extraction by Exploiting Channel Response
    H. Liu, Y. Wang, J. Yang, Y. Chen
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2013), Turin, Italy, April 2013. (Acceptance rate: 17%)
     
  19. Sensing Vehicle Dynamics for Determining Driver Phone Use
    Y. Wang, J. Yang, H. Liu, Y. Chen, M. Gruteser, R. P. Martin,
    Proceedings of the 11th International Conference on Mobile Systems, Applications, and Services (MobiSys 2013), Taipei, Taiwan, June 2013. (Acceptance rate: 33/210=15.7%)
     
  20. E3: Energy-Efficient Engine for Frame Rate Adaptation on Smartphones
    H. Han, J. Yu, H. Zhu, Y. Chen, J. Yang, G. Xue, Y. Zhu, M. Li
    Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys 2013), Rome, Italy, November 2013.(Acceptance rate: 21/123 = 17%)
     
  21. Measuring Human Queues using WiFi Signals
    Y. Wang, J. Yang, Y. Chen, H. Liu, M. Gruteser, R. P. Martin
    ACM Annual International Conference on Mobile Computing and Networking (MobiCom 2013), Pages 235-238, Poster Session, Miami, Sept. 2013. C Winner of Student Research Competition
     
  22. Adaptive Device-Free Passive Localization Coping with Dynamic Target Speed
    X. Zheng, J. Yang, Y. Chen, Y. Gan
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2013), mini-conference, Turin, Italy, April 2013. (Acceptance rate: 25%)
     
  23. Proactive Call Drop Avoidance in UMTS Networks
    S. Zhou, J. Yang, D. Xu, G. Li, Y. Jin, Z. Ge, M. Kosseifi, R. Doverspike, Y. Chen, L. Ying
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2013), mini-conference, Turin, Italy, April 2013. (Acceptance rate: 25%)

     
  24. Push the Limit of WiFi based Localization for Smartphones
    H. Liu, Y. Gan, J. Yang, S. Sidhom, Y. Wang, Y. Chen, F. Ye,
    Proceedings of the ACM Annual International Conference on Mobile Computing and Networking (MobiCom 2012), Istanbul, Turkey, Aug 2012. (Acceptance rate: 32/212 = 15%)
     
  25. Collaborative Secret Key Extraction Leveraging Received Signal Strength in Mobile Wireless Networks
    H. Liu, J. Yang, Y. Wang and Y. Chen
    Proceedings of the IEEE Intl. Conference on Computer Communications (INFOCOM 2012), Orlando, FL, 2012. (Acceptance Rate: 278/1547 = 18%)
     
  26. Detecting Driver Phone Use Leveraging Car Speakers
    J. Yang, S. Sidhom, G. Chandrasekaran, T. Vu, H. Liu, N. Cecan, Y. Chen, M. Gruteser and R. P. Martin
    Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom 2011), Las Vegas, Sept. 2011.(Acceptance rate: 29/214 = 13.5%).- Best Paper Award
     
  27. Designing Localization Algorithms Robust to Signal Strength Attacks
    X. Li, Y. Chen, J. Yang and X. Zheng
    IEEE International Conference on Computer Communications (INFOCOM 2011), mini-Conference, Shanghai, P.R. China, Mar. 2011. (Acceptance rate: 23.4%)
     
  28. Tracking Vehicular Speed Variations by Warping Mobile Phone Signal Strengths
    G. Chandrasekaran, Tam Vu, A. Varshavsky, M. Gruteser, R. P. Martin, J. Yang and Y. Chen
    IEEE International Conference Pervasive Computing and Communication (PerCom 2011), Seattle, USA, Mar. 2011. (Acceptance Rate: 11%)
     
  29. Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare
    Y. Ren, J. Yang, M. C. Chuah and Y. Chen
    IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2011), Valencia, Spain, 2011.
     
  30. Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments
    Jie Yang, Yong Ge, Hui Xiong and Yingying Chen and Hongbo Liu
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2010), San Diego, USA, March, 2010. (Acceptance rate: 276/1575 = 17.5%)
     
  31. Accuracy Characterization of Cell Tower Localization
    Jie Yang, Alexander Varshavsky, Hongbo Liu, Yingying Chen and Marco Gruteser
    Proceedings of the ACM International Conference on Ubiquitous Computing (Ubicomp 2010), Denmark, 2010. (Acceptance rate: 39/202 = 19.3%) 
     
  32. Vehicular Speed Estimation using Received Signal Strength from Mobile Phones
    G. Chandrasekaran, Tam Vu, A. Varshavsky, M. Gruteser, R. P. Martin, J. Yang, and Y. Chen
    Proceedings of the ACM International Conference on Ubiquitous Computing (Ubicomp 2010), Denmark, 2010. (Acceptance rate: 39/202 = 19.3%)
     
  33. Characterizing the Impact of Multi-frequency and Multi-power on Localization Accuracy
    Xiuyuan Zheng, Hongbo Liu, Jie Yang, Yingying Chen, John-Austen Francisco, Richard Martin and Xiaoyan Li, 
    IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2010), San Francisco, California, November 2010.
     
  34. Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks
    Jie Yang, Yingying Chen, Wade Trappe and Jerry Cheng
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2009), Brazil, April 2009. (Acceptance rate: 282/1435 = 19.7%)
     
  35. Detecting Spoofing Attacks in Mobile Wireless Environments
    Jie Yang, Yingying Chen and Wade Trappe
    IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (
    SECON 2009), Rome, Italy, June 2009. (Acceptance rate: 81/431 = 18.8%)
     
  36. Empirical Evaluation of the Limits on Localization using Signal Strength
    G. Chandrasekaran, Mesut Ali Ergin, Jie Yang, Song Liu, Yingying Chen, Marco Gruteser and Richard Martin
    IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (
    SECON 2009), Rome, Italy, June 2009. (Acceptance rate: 81/431 = 18.8%)

     
  37. The Impact of Using Multiple Antennas on Wireless Localization
    K. Kleisouris, Yingying Chen, Jie Yang, Richard P. Martin
    IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (
    SECON 2008), CA, USA, June 2008. (Acceptance rate: 64/304 = 21% )
     
  38. DECODE: Detecting Co-Moving Wireless Devices
    G. Chandrasekaran, Mesut Ergin, Marco Gruteser, Rich Martin, Jie Yang and Yingying Chen
    IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2008), Atlanta, GA, September 2008.

     
  39. A Theoretical Analysis of Wireless Localization Using RF-based Fingerprint Matching
    Jie Yang and Yingying Chen
    IEEE International Workshop on System Management Techniques, Processes, and Services (SMTPS 2008), held in conjunction with IPDPS,
     Miami, Fl, USA, April 2008.

  40. NORM: A Decentralized Location Verification Mechanism for Wireless Sensor Networks
    Yingying Chen, Jie Yang, Xiuyuan Zheng and Venkataraman Swaminathan
    26th Army Science Conference, Orlando, FL, December 2008.

●Home


Professional Activities

  • Proposal Review
    • NSF Panelist, 2014 - 2016
  • Journal Editorial Boards
    • International Journal of Sensor Networks (IJSNet)
    • International Journal of Distributed Sensor Networks Special Issue on Emerging Sensing and Networking Technologies
  • Program Chair
    • Finance Chair: The 22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016
    • Program Vice-Chair: The 18th IEEE International Conference on Computational Science and Engineering, 2015
    • Program Co-Chair: The First International Workshop on Resource Management of Cloud Computing (CCRM 2013), Co-located with ICDCS 2013
    • Session Chair: IEEE International Conference on Distributed Computing Systems (ICDCS), 2013
  • Program Committee Member
    • IEEE International Conference on Computer Communications (INFOCOM), 2014, 2015, 2016, 2017
    • ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), 2015
    • IEEE Conference on Communications and Network Security (CNS), 2016
    • IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), 2015, 2016
    • IEEE International Conference on Computer Communications and Networks (ICCCN), 2012, 2015, 2016
    • IEEE International Conference on Computing, Networking and Communications (ICNC), 2016
    • International Conference on Big Data Computing and Communications (BIGCOM), 2015, 2016
    • The IEEE International Conference on Cloud and Big Data Computing (CBDCom), 2016
    • IEEE Global Communications Conference  (GLOBECOM), 2013, 2014, 2015
    • IEEE Wireless Communications and Networking Conference (WCNC), 2012, 2013, 2014, 2015, 2016
    • IEEE International Performance Computing and Communications Conference (IPCCC), 2015
    • IEEE International Conference on Distributed Computing Systems (ICDCS), 2013
    • IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), 2014
    • IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), 2013
    • IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), 2014, 2015, 2016
    • IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2015
    • IEEE 17th International Conference on e-Health Networking, Applications and Services (Healthcom), 2015
    • ACM Workshop on Visible Light Communication Systems (VLCS), 2015
    • International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), 2015
    • International Conference on Mobile Systems and Pervasive Computing (MobiSPC), 2014
    • International Conference on Body Area Networks (BodyNet), 2013
    • IEEE International Conference on Connected Vehicles & Expo (ICCVE), 2013, 2014, 2015
    • The 2012 Summer FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-Summer), 2012
  • Reviewer for conference:
    • MobiHoc'14, UbiComp'13, INFOCOM'09, '10, '11, '12;  ICDCS'09,'10, '11, '12; Wisec'10, '11, 12'; Percom'10;  Mobisys'09; Ubicomp'09; Pervasive'08; SecureComm'09; ICC'09, '10; Globecom '08, '09,'10,'11,'12; WCNC '09, '10,'11; VTC '10; ChinaCom '09; ICCC'09; ICCCN'09; SSN'09.
  • Reviewer for journals:
    • ACM/IEEE Transactions on Networking (ToN)
    • ACM Transactions on Information and System Security (TISSEC)
    • IEEE Transactions on Mobile Computing (TMC)
    • IEEE Transactions on Parallel and Distributed Systems (TPDS)
    • ACM Transactions on Sensor Networks (ToSN)
    • IEEE Transactions on Information Forensics & Security (TIFS)
    • IEEE Journal on Selected Areas in Communications (JSAC)
    • IEEE Journal of Selected Topics in Signal Processing (J-STSP)
    • IEEE Transactions on Wireless Communications (TWC)
    • IEEE Transactions on Vehicular Technology (TVT)
    • IEEE Internet of Things Journal
    • IEEE Network Magazine
    • IEEE Wireless Communications
    • Physical Communication - Journal - Elsevier
    • Journal of Communications
    • International Journal of Security and Networks
    • International Journal of Distributed Sensor Networks
    • Journal of Communications and Networks
    • Computer Communications
    • Sensors
    • ACM Wireless Networks (WINT)
    • ACM Mobile Networking and Applications (MONET)
    • Wireless Communications and Mobile Computing (WCMC)
    • Computer Networks (Elsevier),
    • Ad Hoc Networks Journal (Elsevier),
    • Security and Communication Networks (Wiley)


wordpress stats plugin