Jie Yang 

 Associate Professor

Department of Computer Science Office: 251C Love Building
Florida State University Email: jyang5 at fsu.edu
Tallahassee, FL 32306 Phone: 850-645-0417

                                                              


Bio Sketch | News | Honors & Awards | Publications | Projects | Teaching | Professional Activities


  I am looking for highly self-motivated PhD students starting in Fall 2021. If you are interested in my research area, please send me email with your CV, transcripts, TOEFL and GRE scores.


Research Interests

 My current research is funded by:

  • National Science Foundation (NSF)
  • Army Research Office (ARO)
  • Florida State University (FSU)

                            


News and Highlights

  • 06/2020: Dr. Yang has received the Developing Scholar Award from Florida State Univeristy.
  • 11/2019: Congratulations to Yili Ren, whose first-authored paper "Liquid Level Sensing Using Commodity WiFi" has been accepted to ACM Ubicomp 2020.
  • 06/2019: Congratulations to Sheng Tan, who will  join the CS department at Trinity University, Texas, as a tenure-track Assistant Professor.
  • 12/2018: Congratulations to Sheng Tan, whose first-authored paper on mult-user tracking and activity recognition using commodity WiFi has been accepted to ACM CHI 2019.
  • 10/2018: Our paper on Obstacle detection using smartphone has been accepted to ACM Ubicomp 2019. Congratulations to Zi Wang.
  • 12/2018: Our work on "Articulatory Gesture Based Mobile Voice Authentication" has been reported in NewScientist, Yahoo!Digital Trends, Daily Mail, Tech Xplore, MobileTechDaily, Sohu, Sina etc.
  • 02/2018: Congratulations to Dr. Yang, who has been slected as a receipt of the Google Research Award.
  • 08/2017: Congratulations to Linghan, whose first-authored paper on mobile voice biometric system has been accepted to ACM CCS 2018.
  • 07/2016: Congratulations to Linghan. Her first-authored paper on voice liveness detection on mobile devices has been accepted to ACM CCS 2017.
  • 04/2016: Our paper on finger gesture recognition using WiFi has been accepted to ACM MobiHoc 2016. Congratulations to Sheng!
  • 01/2016: Our work on steering and driver tracking using wearables has been accepted to IEEE INFOCOM 2016. Congratulations to Sheng!
  • 10/2015: Invited to serve as the finical chair of MobiCom 2016. Please consider submitting your paper to MobiCom 2016.
  • 06/2015: Our paper on keystrokes snooping using a single smartphone has been accepted to ACM MobiCom 2015.
  • 06/2015: Our work on e-signature verification on mobile device has been accepted to IEEE CNS 2015.
  • 03/2015: Our paper on vital signs monitoring using off-the-shelf WiFi has been accepted to ACM MobiHoc 2015.
  • 03/2015: Our work on smartphone privacy has been accepted to IEEE ICDCS 2015.
  • 03/2015: Invited to serve on the TPC of IEEE INFOCOM'16.
  • 02/2015: Our paper on gait pattern recognition using smartphone has been accepted to IEEE TMC.
  • 11/2014: Our work on smartphone based fine-grained sleep monitoring has been reported by the MIT Technology Review , Yahoo News and Zeenews.
  • 10/2014: Our paper on Fine-grained Sleep Monitoring using Smartphone have been accepted to IEEE INFOCOM 2015.
  • 10/2014: Our paper "Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information" won the Best Paper Award in IEEE CNS 2014.
  • 06/2014: Our paper "E-eyes: Device-free Location-oriented Activity Identification Using Fine-grained WiFi Signatures" has been accepted to ACM MobiCom 2014.
  • 05/2014: Prof. Chen presented our research on Detecting Driver Phone Use in the National News Channel: Fox News Channel.
  • 03/2014: Invited to serve on the TPC of IEEE INFOCOM'15.
  • 03/2014: Our paper "Tracking Human Queues Using Single-Point Signal Monitoring" have been accepted to ACM MobiSys 2014.
  • 02/2014: We got one full paper "Practical User Authentication Leveraging Channel State Information" accepted to ACM ASIACCS 2014.
  • 11/2013: We got two papers accepted to IEEE INFOCOM 2014.
  • 10/2013: Our paper "Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming" won the Best Paper Runner-up Award in the IEEE Conference on Communications and Network Security (CNS) 2013.
  • 07/2013: Our paper "E3: Energy-Efficient Engine for Frame Rate Adaptation on Smartphones" has been accepted to ACM SenSys 2013.
  • 03/2013: Our paper "Sensing Vehicle Dynamics for Determining Driver Phone Use" has been accepted to ACM MobiSys 2013.
  • 02/2013: Invited to serve on the TPC of IEEE INFOCOM'14.
  • 01/2013: TPC Co-Chair for the First International Workshop on Resource Management of Cloud Computing (CCRM 2013), in conjunction with ICDCS.
  • 01/2013: Invited to serve on the TPC of IEEE MASS'13.
  • 11/2012: We got three papers accepted to IEEE INFOCOM 2013.
  • 10/2012: Dr. Yang have received an award from the New Jersey Inventors Hall of Fame. (In the middle of the picture is Dr. Steven Chu, the Secretary of Dept. Energy, who has received the Trustees Award in NJ Inventors HoF.)
  • 09/2013: Invited to serve on the TPC of IEEE ICDCS'13.
  • 07/2012: Our paper "Sensing Driver Phone Use with Acoustic Ranging through Car Speakers" has been selected as the Spotlight Paper for the IEEE Transactions on Mobile Computing Screen Shot TMC2012 
  • 06/2012: Our paper "Push the Limit of WiFi based Localization for Smartphones" has been accepted to ACM MobiCom 2012.
  • 02/2012: Our research on detecting driver phone use leveraging car speakers has been featured on Inside Science TV (ISTV). (ISTV is an organization supported by the American Institute of Physics, which produces news vignette about cutting-edge research and development in science and engineering for local television newscasts.)
  • 09/2011: Our paper: Detecting Driver Phone Use Levering Car Speakers won Best Paper Award in MobiCom 2011. This work has been featured in numerous media outlets including MIT Technology Review, The Wall Street Journal, CNET News, Yahoo News, NPR, Autoblog, Stevens News.  It also draws attention of many international media outlets, e.g., Sohu, Sina and CSDN.
  • 06/2011: Our paper "Detecting Driver Phone Use Levering Car Speakers" has been accepted to ACM MobiCom 2011.

Honors & Awards

  • Developing Scholar Awards, Florida State Unviesity, 2020
  • Google Research Award, Google Inc., 2018
  • Distinguished TPC Member Award, IEEE Communication Society, 2016
  • Best Paper Award, IEEE Conference on Communications and Network Security (CNS) 2014.
  • Best Paper Award - Runner-up, IEEE Conference on Communications and Network Security (CNS) 2013.
  • Best Paper Award, ACM International Conference on Mobile Computing and Networking (MobiCom), 2011.
  • Winner of ACM MobiCom Student Research Competition, 2013.
  • Spotlight Paper of the September 2012 issue of the IEEE Transactions on Mobile Computing, 2012.
  • Francis T. Boesch Award, Stevens Institute of Technology, 2011
  • Graduate Student Award, New Jersey Inventors Hall of Fame, 2011
  • ACM MobiCom Student Travel Grant, 2010, 2011
  • Outstanding Research Award, Stevens Institute of Technology, 2009
  • Best Poster Award, IEEE Wireless and Optical Communications Conference (IEEE WOCC), 2009
  • Innovation & Entrepreneurship Doctoral Fellowship, Stevens Institute of Technology, 2007~2010

Home


Teaching

  • CIS4360 - Introduction to Computer Security, Fall 2017, Fall 2015, Fall 2014
  • CIS 4530 - Data Structures, Algorithms, and Generic Programming, Fall 2016
  • CIS 5900 - Wireless and Mobile Computing, Spring, 2017, Spring 2016, Spring 2015
  • CSE 232 - C++ for Programmers, Spring 2014, Spring 2013
  • CSE 142 - Intro to C Programming & Unix, Spring 2014, Spring 2013
  • CIT 448 - Information Security Practice, Fall 2013
  • CSE/CIT 247 - Introduction to Computer Networks, Fall 2012
  • CPE/EE 556 - Computing Principles for Embedded Systems [ Syllabus], Spring 2012, Fall 2011

Publications 

Book

   Pervasive Wireless Environments: Detecting and Localizing User Spoofing,
   J. Yang, Y. Chen, W. Trappe, J. Cheng
   ISBN 978-3-319-07356-9, Springer, 2014.

Book Chapters

  1. Defending Against Identity-Based Attacks in Wireless Networks
    Yingying Chen and Jie Yang
    Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, Sajal Das, Krishna Kant and Nan Zhang (eds.), Morgan Kauffman, Morgan Kaufmann, ISBN: 978-0-12-415815-3, chapter 2-4, Jan., 2012.

  2. On the Performance of Wireless Indoor Localization Using Received Signal Strength
    Jie Yang, Yingying Chen, R. P. Martin, and M. Gruteser
    Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE Press, ISBN: 978-0-470-94342-7, chapter 12, Nov., 2011.

  3. Impact of Anchor Placement and Anchor Selection on Localization Accuracy
    Yingying Chen, Jie Yang, Wade Trappe and R. P. Martin
    Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE Press, ISBN: 978-0-470-94342-7, chapter 13, Nov., 2011. 

Journal Papers and Magazine Articles

  1. Signature Verification Using Critical Segments for Securing Mobile Transactions
    Y. Ren, C. Wang, Y. Chen, M. Chuah, J. Yang,
    IEEE Transactions on Mobile Computing (IEEE TMC), Volume 19, Issue 3, Pages 724 - 739, 2020.

  2. Implications of Smartphone User Privacy Leakage from the Advertiser's Perspective
    Y. Wang, Y. Chen, F. Ye, H. Liu, J. Yang
    Pervasive and Mobile Computing, Volume 53, Pages 13-32, 2019.

  3. Non-invasive Fine-grained Sleep Monitoring Leveraging Smartphones
    Y. Ren, C. Wang, Y. Chen,  J. Yang
    IEEE Internet of Things Journal (IEEE IoT), Volume 6, Issue 5, Pages 8248 - 8261, 2019.

  4. Authenticating Users through Fine-grained Channel Information,
    H. Liu, Y. Wang, J. Liu, J. Yang, Y. Chen, H. V. Poor,
    IEEE Transactions on Mobile Computing (IEEE TMC), vol. 17, no. 2, pp.251-264, 2018
    .

  5. Monitoring Vital Signs and Postures During Sleep Using WiFi Signals
    J. Liu, Y. Chen, Y. Wang, X. Chen, J. Cheng, J. Yang,
    IEEE Internet of Things Journal (IEEE IoT), Volume 5, Issue 3, Pages 2071-2084, 2018.

  6. Locating Rogue Access Point using Fine-grained Channel Information,
    Chen Wang, Xiuyuan Zheng, Yingying Chen, Jie Yang,
    IEEE Transactions on Mobile Computing (IEEE TMC),  vol. 16, no. 9, pp.2560-2573, 2017.

  7. Enabling Self-healing Smart Grid Through Jamming Resilient Local Controller Switching
    H. Liu, Y. Chen, M. C. Chuah, J. Yang, H. V. Poor
    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), vol. 14, no. 4, pp.377-391, 2017.

  8. Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors
    Y. Wang, Y. Chen, J. Yang, M. Gruteser, R. P. Martin, H. Liu, L. Liu and C. Karatas
    IEEE Transactions on Mobile Computing (IEEE TMC), vol. 15, no. 8, pp. 1965-1981, 2016

  9. SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments
    J. Yu, H. Han, H. Zhu, Y. Chen, J. Yang, Y. Zhu, G. Xue and M. Li
    IEEE Transactions on Mobile Computing (IEEE TMC), vol. 15, no.1, pp. 202-216, 2016.

  10. User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems
    Y. Ren, Y. Chen, M. C. Chuah, and J. Yang
    IEEE Transactions on Mobile Computing (IEEE TMC), vol. 14, no. 9, pp.1961-1974, 2015.

  11. Protecting Multi-Lateral Localization Privacy in Pervasive Environments
    T. Shu, Y. Chen, J. Yang
    IEEE/ACM Transactions on Networking (IEEE/ACM ToN), 23(5): 1688-1701, 2015

  12. An Adaptive Framework Coping with Dynamic Target Speed for Device-Free Passive Localization
    X. Zheng, J. Yang, Y. Chen, and H. Xiong
    IEEE Transactions on Mobile Computing (IEEE TMC), vol.14, no.6, pp.1138-1150,  2015.

  13. Sensing Human Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones
    J. Yu, H. Han, H. Zhu, Y. Chen, J. Yang, G. Xue, Y. Zhu, M. Li
    IEEE Transactions on Mobile Computing (IEEE TMC), vol.14, no.8, pp.1698-1711,  2015.

  14. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation
    H. Liu, J. Yang, Y. Wang, Y. Chen, and C. E. Koksal
    IEEE Transactions on Mobile Computing (IEEE TMC), vol.13, no.12, pp.2820,2835,  2014.

  15. Accurate WiFi Based Localization for Smartphones Using Peer Assistance
    H. Liu, J. Yang, S. Sidhom, Y. Wang, Y. Chen and F. Ye
    IEEE Transactions on Mobile Computing (IEEE TMC), vol.13, no.10, pp.2199-2214, 2014.

  16. A Study of Localization Accuracy using Multiple Frequencies and Powers
    X. Zheng, H. Liu, J. Yang, Y. Chen, R. P. Martin and X. Li
    IEEE Transactions on Parallel & Distributed Systems (IEEE TPDS), Volume 25, No.8, Pages 1955-1965, 2014.

  17. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
    J. Yang, Y. Chen, W. Trappe and J. Cheng,
    IEEE Transactions on Parallel & Distributed Systems
    (IEEE TPDS),  Volume 24, No.1, Pages 44-58, 2013.

  18. Sensing Driver Phone Use with Acoustic Ranging Through Car Speakers
    J. Yang, S. Sidhom, G. Chandrasekaran, T. Vu, H. Liu, N. Cecan, Y. Chen, M. Gruteser and R. P. Martin
    IEEE Transactions on Mobile Computing (IEEE TMC), Volume11, NO.9, Pages 1426-1440, 2012.

  19. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks
    Y. Chen, J. Yang, W. Trappe and R. P. Martin
    IEEE Transactions on Vehicular Technology (IEEE TVT), vol.59, no.5, pp.2418-2434, 2010.

  20. Empirical Evaluation of Wireless Localization When Using Multiple Antennas
    K. Kleisouris, Y. Chen, J. Yang and R. P. Martin
    IEEE Transactions on Parallel and Distributed Systems
    (IEEE TPDS), vol.21, no.11, pp.1595-1610, 2010.

  21. DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices
    G. Chandrasekaran, Mesut Ergin, Marco Gruteser, Rich Martin, Jie Yang and Yingying Chen
    IEEE Transactions on Mobile Computing
    (IEEE TMC), vol. 8, no. 12, pp. 1663-1675, 2009.

  22. A Low-Cost Wi-Fi-Based Solution for Measuring Human Queues
    Y. Wang, Y. Chen, J. Yang, H. Liu, M. Gruteser, R. P. Martin
    GetMobile: Mobile Computing and Communications, vol.19, no.1, pp.10-13,  2015.

  23. Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones
    Y. Ren, J. Yang, M. C. Chuah, and Y. Chen
    Ad Hoc & Sensor Wireless Networks (AHSWN), Vol. 27, no. 1-2, pp. 51-73, 2015.

  24. Achieving Robust Wireless Localization Resilient to Signal Strength Attacks
    X. Li, Y. Chen, J. Yang, X, Zheng
    Wireless Networks (WINET), Springer, Volume 18, Issue 1, Page 45-58, 2012.

  25. Towards Attack Resistant Localization under Infrastructure Attacks
    J. Yang and Y. Chen
    Security and Communication Networks (SCN), Wiley, DOI: 10.1002/sec.323, Volume 5, No.4, Pages 384-403, 2012.

  26. A Social Community Based Approach for Reducing the Propagation of Infectious Diseases in Healthcare
    Jie Yang, Yanzhi Ren, Yingying Chen and M. C. Chuah
    ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Vol. 14, Issue 3, Pages 7 -9, 2010.

  27. Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments
    Jie Yang and Yingying Chen and Jerry Cheng
    Ad Hoc & Sensor Wireless Networks (AHSWN), vol.11 , no.3-4 , pp.307-329, 2011.

  28. Detecting Wormhole Attacks in Delay Tolerant Networks
    Yanzhi Ren, M. C. Chuah, Jie Yang and Yingying Chen
    IEEE Wireless Communications Magazine
    (IEEE WCM), vol.17, no.5, pp.36-42, October 2010.

  29. A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks
    Yingying Chen, Wang Hui, Xiuyuan Zheng and Jie Yang,
    EURASIP Journal on Wireless Communications and Networking
    (JWCN), vol. 2010 (319275), Jun. 2010.

  30. Fast object recognition using local scale-invariant features
    Zhiqian Zhou, Bo Wang, Jie Yang, and Ji Lu
    Optical Technique, vol. 34, no. 5, pp. 742-745, 2008.

Selected Conference Publications

  1. Liquid Level Sensing Using Commodity WiFi in a Smart Home Environment
    Y Ren, S Tan, L Zhang, Z Wang, Z Wang, J Yang
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (ACM Ubicomp), September, 2020.

  2. Origin-sensitive Control Flow Integrity
    MR Khandaker, W Liu, A Naser, Z Wang, J Yang
    Proceedings of the 28th USENIX Security Symposium (USENIX Security),  Santa Clara, CA, USA, 2019.

  3. MultiTrack: Multi-User Tracking and Activity Recognition Using Commodity WiFi
    S Tan, L Zhang, Z Wang, J Yang
    Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (ACM CHI), Glasgow, United Kingdom, 2019.

  4. ObstacleWatch: Acoustic-based Obstacle Collision Detection for Pedestrian Using Smartphone
    Z Wang, S Tan, L Zhang, J Yang
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (ACM UbiComp), Pairs, UK, 2019.

  5. Hearing Your Voice Is Not Enough: An Articulatory Gesture Based Mobile Voice Authentication
    L. Zhang, S. Tan, J. Yang
    Proceedings of the 24rd ACM Conference on Computer and Communications Security (ACM CCS 2018), Dallas, USA, October, 2018. (Acceptance rate: 151/843 = 18%)
    .

  6. Sensing Fruit Ripeness Using Wireless Signals
    S. Tan, L. Zhang, J. Yang
    Proceedings of the 27th IEEE International Conference on Computer Communications and Networks (ICCCN), Hangzhou, China, Jun, 2018.

  7. Towards Efficient Mobile Augmented Reality in Indoor Environments
    M. Alahmadi, J. Yang
    International Conference on AI and Mobile Services (AIMS), San Francisco, CA, USA, 2018.

  8. VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones
    L. Zhang, S. Tan, Y. Chen
    , J. Yang
    Proceedings of the 23rd ACM Conference on Computer and Communications Security (
    ACM CCS 2017), Vienna, Austria, October, 2017. (Acceptance rate: 137/831 = 16.5%)

  9. WiFinger: Leveraging Commodity WiFi for Fine-grained Finger Gesture Recognition
    S. Tan and J. Yang
    Proceedings of the Seventeenth International Symposium on Mobile Ad Hoc Networking and Computing (
    ACM MobiHoc 2016), Paderborn, Germany, July, 2016. (Acceptance rate: 35/187 = 18.7%)

  10. Leveraging Wearables for Steering and Driver Tracking
    C. Karatas, L. Liu, H. Li, J. Liu, Y. Wang, S. Tan, Y. Chen, M. Gruteser, R. Martin
    , J. Yang
    Proceedings of IEEE International Conference on Computer Communications (INFOCOM 2016), San Francisco, USA, April 2016. (Acceptance rate: 300/1644 = 18.25%)

  11. Snooping Keystrokes with mm-level Audio Ranging on a Single Phone
    J. Liu, Y. Wang, G. Kar, Y. Chen, M. Gruteser
    , J. Yang
    Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom 2015), Paris, France, September 2015. (Acceptance rate: 38/207 = 18.4%)

  12. Towards Understanding the Advertiser's Perspective of Smartphone User Privacy
    Y. Wang, Y. Chen, F. Ye, H. Liu
    , J. Yang
    Proceedings of the 35th IEEE International Conference on Distributed Computing System (ICDCS 2015), Columbus, Ohio, June 2015. (Acceptance rate: 70/543 = 12.8%)

  13. Fine-grained Sleep Monitoring: Hearing Your Breathing with Smartphones
    Y. Ren, C. Wang, Y. Chen
    , J. Yang
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2015), Hong Kong, China, April 2015. (Acceptance rate: 316/1640 = 19%)

  14. Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi
    J. Liu, Y. Wang, Y. Chen, X. Chen, J. Cheng
    , J. Yang
    Proceedings of the 16th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2015), Hangzhou, China, June 2015. (Acceptance rate: 37/250 = 14.8%)

  15. Sensing Ambient Light for User Experience-Oriented Color Scheme Adaptation on Smartphone Displays
    J. Yu, J. Zhao, Y. Chen, J. Yang
    Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems (SenSys 2015), Seoul, South Korea, November 2015.(Acceptance rate: 27/132 = 20%)

  16. Critical Segment Based Real-time E-Signature for Securing Mobile Transactions
    Y. Ren, C. Wang, Y. Chen, M. C. Chuah, J. Yang
    Proceedings of the IEEE Conference on Communications and Network Security (CNS 2015), Florence, Italy, 2015

  17. Toward Detection of Unsafe Driving with Wearables
    L. Liu, C. Karatas, H. Li, S. Tan, M. Gruteser, Y. Chen, R. P. Martin, J. Yang
    Proceedings of the 1st ACM Workshop on Wearable Systems and Applications at MobiSys (WearSys 2015), Florence, Italy, 2015.

  18. E-eyes: Device-free Location-oriented Activity Identification Using Fine-grained WiFi Signatures
    Y. Wang, J. Liu, Y. Chen, M. Gruteser, H. Liu, J. Yang

    Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom 2014), Maui, Hawii, Sept. 2014. (Acceptance rate: 36/220 = 16.4%)

  19. Multi-lateral Privacy-Preserving Localization in Pervasive Environments
    T. Shu, Y. Chen, J. Yang and A. Williams
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2014), Toronto, Canada, April 2014. (Acceptance rate: 19%)

  20. SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments
    H. Han, J. Yu, H. Zhu, Y. Chen, Jie Yang, G. Xue, Y. Zhu, M. Li
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2014), Toronto, Canada, April 2014. (Acceptance rate: 19%)

  21. Practical User Authentication Leveraging Channel State Information
    H. Liu, Y. Wang, J. Liu, J. Yang and Y. Chen
    Proceedings of the 9th ACM Asia Conference on Information, Computer and Communications Security (Asia CCS 2014) , Kyoto, Japan, June 2014. (Acceptance rate: 52/260 = 20%)

  22. Tracking Human Queues Using Single-Point Signal Monitoring
    Y. Wang, J. Yang, Y. Chen, H. Liu, M. Gruteser, R. P. Martin
    Proceedings of the 12th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2014), New Hampshire, USA, June 2014.(Acceptance rate: 25/185 = 13.5%)

  23. Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information
    X. Zheng, W. Chen, Y. Chen, J. Yang
    Proceedings of the 2nd IEEE Conference on Communications and Network Security (CNS 2014), October, San Francisco, CA, 2014 - Best Paper Award

  24. Robot-Assisted Human Indoor Localization Using the Kinect Sensor and Smartphones
    C. Jiang, M. Fahad, Y. Guo, J. Yang, Y. Chen,
    Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2014), Chicago, Sept., 2014.


  25. Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing
    Y. Ren, Y. Chen, J. Yang, B. Xie
    Proceedings of the I
    IEEE Global Communications Conference - Communication and Information System Security Symposium (Globecom 2014), Texas, USA, Dec., 2014.

  26. Measuring Human Queues using WiFi Signals
    Y. Wang, J. Yang, Y. Chen, H. Liu, M. Gruteser, R. P. Martin
    ACM Annual International Conference on Mobile Computing and Networking (MobiCom 2013), Pages 235-238, Poster Session, Miami, Sept. 2013. ĘC Winner of Student Research Competition

  27. Fast and Practical Secret Key Extraction by Exploiting Channel Response
    H. Liu, Y. Wang, J. Yang, Y. Chen
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2013), Turin, Italy, April 2013. (Acceptance rate: 17%)

  28. Adaptive Device-Free Passive Localization Coping with Dynamic Target Speed
    X. Zheng, J. Yang, Y. Chen, Y. Gan
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2013), mini-conference, Turin, Italy, April 2013. (Acceptance rate: 25%)

  29. Proactive Call Drop Avoidance in UMTS Networks
    S. Zhou, J. Yang, D. Xu, G. Li, Y. Jin, Z. Ge, M. Kosseifi, R. Doverspike, Y. Chen, L. Ying
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2013), mini-conference, Turin, Italy, April 2013. (Acceptance rate: 25%)

  30. Sensing Vehicle Dynamics for Determining Driver Phone Use
    Y. Wang, J. Yang, H. Liu, Y. Chen, M. Gruteser, R. P. Martin,
    Proceedings of the 11th International Conference on Mobile Systems, Applications, and Services (MobiSys 2013), Taipei, Taiwan, June 2013. (Acceptance rate: 33/210=15.7%)

  31. E3: Energy-Efficient Engine for Frame Rate Adaptation on Smartphones
    H. Han, J. Yu, H. Zhu, Y. Chen, J. Yang, G. Xue, Y. Zhu, M. Li
    Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys 2013), Rome, Italy, November 2013.(Acceptance rate: 21/123 = 17%)

  32. Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming
    H. Liu, Y. Chen, M. C. Chuah, J. Yang
    Proceedings of IEEE Conference on Communications and Network Security (CNS 2013), Washington, D.C., USA, October 2013. - Best Paper Award - Runner-up

  33. Smartphone Based User Verification Leveraging Gait Recognition for Mobile Healthcare Systems
    Y. Ren, Y. Chen, M. C. Chuah and J. Yang
    Proceedings of the the 10th Annual IEEE Communications Society Conference on Sensing and Communication in Wireless Networks (SECON 2013), New Orleans, USA

  34. Push the Limit of WiFi based Localization for Smartphones
    H. Liu, Y. Gan, J. Yang, S. Sidhom, Y. Wang, Y. Chen, F. Ye,
    Proceedings of the ACM Annual International Conference on Mobile Computing and Networking (MobiCom 2012), Istanbul, Turkey, Aug 2012. (Acceptance rate: 32/212 = 15%)

  35. Collaborative Secret Key Extraction Leveraging Received Signal Strength in Mobile Wireless Networks
    H. Liu, J. Yang, Y. Wang and Y. Chen
    Proceedings of the IEEE Intl. Conference on Computer Communications (INFOCOM 2012), Orlando, FL, 2012. (Acceptance Rate: 278/1547 = 18%)

  36. Securing Mobile Location-based Services through Position Verification leveraging Key Distribution
    J. Yang, Y. Chen, S. Macwan, C. Serban, S. Chen, W. Trappe
    Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2012), pages: 2694-2699, 2012

  37. Detecting Driver Phone Use Leveraging Car Speakers
    J. Yang, S. Sidhom, G. Chandrasekaran, T. Vu, H. Liu, N. Cecan, Y. Chen, M. Gruteser and R. P. Martin
    Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom 2011), Las Vegas, Sept. 2011.(Acceptance rate: 29/214 = 13.5%).
    - Best Paper Award

  38. Designing Localization Algorithms Robust to Signal Strength Attacks
    X. Li, Y. Chen, J. Yang and X. Zheng
    IEEE International Conference on Computer Communications (INFOCOM 2011), mini-Conference, Shanghai, P.R. China, Mar. 2011. (Acceptance rate: 23.4%)

  39. Tracking Vehicular Speed Variations by Warping Mobile Phone Signal Strengths
    G. Chandrasekaran, Tam Vu, A. Varshavsky, M. Gruteser, R. P. Martin, J. Yang and Y. Chen
    IEEE International Conference Pervasive Computing and Communication (PerCom 2011), Seattle, USA, Mar. 2011. (Acceptance Rate: 11%)

  40. Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare
    Y. Ren, J. Yang, M. C. Chuah and Y. Chen
    IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2011), Valencia, Spain, 2011.

  41. Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching
    Y. Ren, M. C. Chuah, J. Yang and Y. Chen
    IEEE Global Communications Conference (GLOBECOM 2011), Houston, Texas, 2011.

  42. Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments
    Jie Yang, Yong Ge, Hui Xiong and Yingying Chen and Hongbo Liu
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2010), San Diego, USA, March, 2010. (Acceptance rate: 276/1575 = 17.5%)

  43. Accuracy Characterization of Cell Tower Localization
    Jie Yang, Alexander Varshavsky, Hongbo Liu, Yingying Chen and Marco Gruteser
    Proceedings of the ACM International Conference on Ubiquitous Computing (Ubicomp 2010), Denmark, 2010. (Acceptance rate: 39/202 = 19.3%)

  44. Vehicular Speed Estimation using Received Signal Strength from Mobile Phones
    G. Chandrasekaran, Tam Vu, A. Varshavsky, M. Gruteser, R. P. Martin, J. Yang, and Y. Chen
    Proceedings of the ACM International Conference on Ubiquitous Computing (Ubicomp 2010), Denmark, 2010. (Acceptance rate: 39/202 = 19.3%)

  45. Characterizing the Impact of Multi-frequency and Multi-power on Localization Accuracy
    Xiuyuan Zheng, Hongbo Liu, Jie Yang, Yingying Chen, John-Austen Francisco, Richard Martin and Xiaoyan Li, 
    IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2010), San Francisco, California, November 2010.

  46. Mobile Sensing Enabled Robust Detection of Security Threats in Urban Environments
    Jie Yang, Jerry Cheng and Yingying Chen
    International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (Qshine 2010), Houston, Texas, USA, November 2010.

  47. Passive Intrusion Detection in Wireless Networks by Exploiting Clustering-based Learning
    Jie Yang, Yingying Chen, Sachi Desai and Shafik Quoraishee
    Proceedings of SPIE, Vol. 7706, 770604 (SPIE 2010), Orlando, Florida, USA, Apr., 2010.


  48. Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording
    Yanzhi Ren, M. C. Chuah, Jie Yang and Yingying Chen
    International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN 2010), held in conjunction with WoWMoM, Montreal, QC, Canada, June 2010.


  49. MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
    Yanzhi Ren, M.-C. Chuah, Jie Yang and Yingying Chen
    IEEE Wireless Communications and Networking Conference (WCNC 2010), Sydney, Australia, April, 2010.


  50. Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks
    Jie Yang, Yingying Chen, Wade Trappe and Jerry Cheng
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2009), Brazil, April 2009. (Acceptance rate: 282/1435 = 19.7%)


  51. Detecting Spoofing Attacks in Mobile Wireless Environments
    Jie Yang, Yingying Chen and Wade Trappe
    IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON 2009), Rome, Italy, June 2009. (Acceptance rate: 81/431 = 18.8%)


  52. Empirical Evaluation of the Limits on Localization using Signal Strength
    G. Chandrasekaran, Mesut Ali Ergin, Jie Yang, Song Liu, Yingying Chen, Marco Gruteser and Richard Martin
    IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON 2009), Rome, Italy, June 2009. (Acceptance rate: 81/431 = 18.8%)

  53. Indoor Localization Using Improved RSS-Based Lateration Methods
    Jie Yang, Yingying Chen
    IEEE Global Communications Conference: Wireless Networking Symposium (Globecom 2009), Hawaii, USA, November, 2009.

  54. Robust Wireless Localization to Attacks on Access Points
    Jie Yang, Yingying Chen, Victor Lawrence and Venkataraman Swaminathan
    IEEE Sarnoff Symposium (Sarnoff 2009), Princeton, NJ, April 2009.

  55. Prediction of Near Likely Sensors in Data-Centric Mobile Sensor Networks
    Yingying Chen, Hui Wang, Xiuyuan Zheng and Jie Yang
    IEEE Military Communication Conference (MILCOM 2009), Boston, MA, October 2009.


  56. Using a Multiple Analytical Distribution Filter for Underwater Localization
    D. Kruger, Hongyuan Shi, Yingying Chen, Hongbo Liu, Jie Yang and L. Imas
    Proceedings of SPIE 7480, 74800T, Berlin, Germany, August, 2009.


  57. The Impact of Using Multiple Antennas on Wireless Localization
    K. Kleisouris, Yingying Chen, Jie Yang, Richard P. Martin
    IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2008), CA, USA, June 2008. (Acceptance rate: 64/304 = 21% )

  58. Detecting Sybil Attacks in Wireless and Sensor Networks Using Cluster Analysis
    Jie Yang, Yingying Chen and Wade Trappe

    IEEE International Workshop on Wireless and Sensor Networks Security (WSNS 2008), held in conjunction with MASS 2008.


  59. DECODE: Detecting Co-Moving Wireless Devices
    G. Chandrasekaran, Mesut Ergin, Marco Gruteser, Rich Martin, Jie Yang and Yingying Chen
    IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2008), Atlanta, GA, September 2008.

  60. A Theoretical Analysis of Wireless Localization Using RF-based Fingerprint Matching
    Jie Yang and Yingying Chen
    IEEE International Workshop on System Management Techniques, Processes, and Services (SMTPS 2008), held in conjunction with IPDPS,
     Miami, Fl, USA, April 2008.

  1. A Trusted Infrastructure for Facilitating Access Control Location Information
    Yingying Chen, Jie Yang and Fangming He
    IEEE Military Communication Conference (MILCOM 2008), San Diego, CA, November 2008.


  2. NORM: A Decentralized Location Verification Mechanism for Wireless Sensor Networks
    Yingying Chen, Jie Yang, Xiuyuan Zheng and Venkataraman Swaminathan
    26th Army Science Conference, Orlando, FL, December 2008.

Home


Professional Activities

  • Proposal Review
    • NSF Panelist, 2014 - 2017
  • Journal Editorial Boards
    • International Journal Wireless Communications and Mobile Computing (Wiley)
    • International Journal of Sensor Networks (IJSNet)
    • International Journal of Distributed Sensor Networks Special Issue on Emerging Sensing and Networking Technologies
  • Program Chair
    • Finance Chair: IEEE International Symposium on Dynamic Spectrum Access Networks (Dyspan), 2019.
    • Poster/Demo Co-Chair: IEEE International Conference on Industrial Internet (IEEE ICII), 2019.
    • Publicity Co-Chair: The 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), 2016.
    • Finance Chair: The 22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016
    • Program Vice-Chair: The 18th IEEE International Conference on Computational Science and Engineering, 2015
    • Program Co-Chair: The First International Workshop on Resource Management of Cloud Computing (CCRM 2013), Co-located with ICDCS 2013
  • Program Committee Member
    • IEEE International Conference on Computer Communications (INFOCOM), 2014, 2015, 2016, 2017, 2020
    • ACM  Conference on Security and Privacy in Wireless and Mobile Networks (Wisec), 2019, 2020
    • ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), 2015
    • IEEE Conference on Communications and Network Security (CNS), 2016, 2017
    • IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), 2015, 2016
    • IEEE International Conference on Computer Communications and Networks (ICCCN), 2012, 2015, 2016
    • IEEE International Conference on Computing, Networking and Communications (ICNC), 2016
    • International Conference on Big Data Computing and Communications (BIGCOM), 2015, 2016
    • The IEEE International Conference on Cloud and Big Data Computing (CBDCom), 2016
    • IEEE Global Communications Conference  (GLOBECOM), 2013, 2014, 2015
    • IEEE Wireless Communications and Networking Conference (WCNC), 2012, 2013, 2014, 2015, 2016
    • IEEE International Performance Computing and Communications Conference (IPCCC), 2015
    • IEEE International Conference on Distributed Computing Systems (ICDCS), 2013
    • IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), 2014
    • IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), 2013
    • IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), 2014, 2015, 2016
    • IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2015
    • IEEE 17th International Conference on e-Health Networking, Applications and Services (Healthcom), 2015
    • ACM Workshop on Visible Light Communication Systems (VLCS), 2015
    • International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), 2015
    • International Conference on Mobile Systems and Pervasive Computing (MobiSPC), 2014
    • International Conference on Body Area Networks (BodyNet), 2013
    • IEEE International Conference on Connected Vehicles & Expo (ICCVE), 2013, 2014, 2015
    • The 2012 Summer FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-Summer), 2012
  • Reviewer for conference:
    • MobiHoc'14, UbiComp'13, INFOCOM'09, '10, '11, '12;  ICDCS'09,'10, '11, '12; Wisec'10, '11, 12'; Percom'10;  Mobisys'09; Ubicomp'09; Pervasive'08; SecureComm'09; ICC'09, '10; Globecom '08, '09,'10,'11,'12; WCNC '09, '10,'11; VTC '10; ChinaCom '09; ICCC'09; ICCCN'09; SSN'09.
  • Reviewer for journals:
    • ACM/IEEE Transactions on Networking (ToN)
    • ACM Transactions on Information and System Security (TISSEC)
    • IEEE Transactions on Mobile Computing (TMC)
    • IEEE Transactions on Parallel and Distributed Systems (TPDS)
    • ACM Transactions on Sensor Networks (ToSN)
    • IEEE Transactions on Information Forensics & Security (TIFS)
    • IEEE Journal on Selected Areas in Communications (JSAC)
    • IEEE Journal of Selected Topics in Signal Processing (J-STSP)
    • IEEE Transactions on Wireless Communications (TWC)
    • IEEE Transactions on Vehicular Technology (TVT)
    • IEEE Internet of Things Journal
    • IEEE Network Magazine
    • IEEE Wireless Communications
    • Physical Communication - Journal - Elsevier
    • Journal of Communications
    • International Journal of Security and Networks
    • International Journal of Distributed Sensor Networks
    • Journal of Communications and Networks
    • Computer Communications
    • Sensors
    • ACM Wireless Networks (WINT)
    • ACM Mobile Networking and Applications (MONET)
    • Wireless Communications and Mobile Computing (WCMC)
    • Computer Networks (Elsevier),
    • Ad Hoc Networks Journal (Elsevier),
    • Security and Communication Networks (Wiley)