Search Results - "Liu, Daibo"

Refine Results
  1. 1

    Achieving Accurate and Real-Time Link Estimation for Low Power Wireless Sensor Networks by Liu, Daibo, Cao, Zhichao, Zhang, Yi, Hou, Mengshu

    Published in IEEE/ACM transactions on networking (01-08-2017)
    “…Link estimation is a fundamental component of forwarding protocols in wireless sensor networks. In low power forwarding, however, the asynchronous nature of…”
    Get full text
    Journal Article
  2. 2

    Chase: Taming Concurrent Broadcast for Flooding in Asynchronous Duty Cycle Networks by Cao, Zhichao, Liu, Daibo, Wang, Jiliang, Zheng, Xiaolong

    Published in IEEE/ACM transactions on networking (01-10-2017)
    “…Asynchronous duty cycle is widely used for energy constraint wireless nodes to save energy. The basic flooding service in asynchronous duty cycle networks,…”
    Get full text
    Journal Article
  3. 3

    Using Acoustic Signal and Image to Achieve Accurate Indoor Localization by Xi, Rui, Liu, Daibo, Hou, Mengshu, Li, Yujun, Li, Jun

    Published in Sensors (Basel, Switzerland) (06-08-2018)
    “…Location information plays a key role in pervasive computing and application, especially indoor location-based service, even though a mass of systems have been…”
    Get full text
    Journal Article
  4. 4

    Deep Dilation on Multimodality Time Series for Human Activity Recognition by Xi, Rui, Li, Ming, Hou, Mengshu, Fu, Mingsheng, Qu, Hong, Liu, Daibo, Haruna, Charles R.

    Published in IEEE access (01-01-2018)
    “…Providing accurate information on people's activities and behaviors plays an important role in innumerable applications, such as medical, security, and…”
    Get full text
    Journal Article
  5. 5

    COF: Exploiting Concurrency for Low Power Opportunistic Forwarding by Liu, Daibo, Hou, Mengshu, Cao, Zhichao, He, Yuan, Ji, Xiaoyu, Zheng, Xiaolong

    “…Due to the constraint of energy resource, the radio of sensor nodes usually works in a duty-cycled mode. Since the sleep schedules of nodes are unsynchronized,…”
    Get full text
    Conference Proceeding Journal Article
  6. 6

    Tele Adjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs by Liu, Daibo, Cao, Zhichao, Wu, Xiaopei, He, Yuan, Ji, Xiaoyu, Hou, Mengshu

    “…On-air access of individual sensor node (called remote control) is an indispensable function in operational wireless sensor networks, for purposes like network…”
    Get full text
    Conference Proceeding Journal Article
  7. 7

    Chase: Taming concurrent broadcast for flooding in asynchronous duty cycle networks by Zhichao Cao, Jiliang Wang, Daibo Liu, Xiaolong Zheng

    “…Asynchronous duty cycle is widely used for energy constraint wireless nodes to save energy. The basic flooding service in asynchronous duty cycle networks,…”
    Get full text
    Conference Proceeding
  8. 8

    Bat with Good Eyesight: Using Acoustic Signal and Image to Achieve Accurate Indoor Localization by Rui Xi, Yujun Li, Daibo Liu, Siwei Luo, Mengshu Hou

    “…Despite very significant efforts on smartphonebased indoor localization, highly accurate and practical method remains an open problem. To guarantee accuracy,…”
    Get full text
    Conference Proceeding
  9. 9

    Connecting the Dots: Reconstructing Network Behavior with Individual and Lossy Logs by Wang, Jiliang, Zheng, Xiaolong, Mao, Xufei, Cao, Zhichao, Liu, Daibo, Liu, Yunhao

    “…In distributed networks such as wireless ad hoc networks, local and lossy logs are often available on individual nodes. We propose REFILL, which analyzes lossy…”
    Get full text
    Conference Proceeding Journal Article
  10. 10

    DOF: Duplicate Detectable Opportunistic Forwarding in duty-cycled wireless sensor networks by Daibo Liu, Zhichao Cao, Jiliang Wang, Yuan He, Mengshu Hou, Yunhao Liu

    “…Opportunistic routing, offering relatively efficient and adaptive forwarding in low-duty-cycled sensor networks, generally allows multiple nodes to forward the…”
    Get full text
    Conference Proceeding
  11. 11

    Resource Allocation and Trajectory Optimization for QoE Provisioning in Energy-Efficient UAV-Enabled Wireless Networks by Zeng, Fanzi, Hu, Zhenzhen, Xiao, Zhu, Jiang, Hongbo, Zhou, Siwang, Liu, Wenping, Liu, Daibo

    Published in IEEE transactions on vehicular technology (01-07-2020)
    “…In the past several years, unmanned aerial vehicle (UAV) have been employed to provide enhanced coverage or relay service to mobile users in a scenario with…”
    Get full text
    Journal Article
  12. 12

    E-Argus: Drones Detection by Side-Channel Signatures via Electromagnetic Radiation by Zhang, Qibo, Zeng, Fanzi, Hu, Jingyang, Liu, Daibo, Kuang, Ling, Xiao, Zhu, Jiang, Hongbo

    “…The increasing misuse of commercial drones for illicit activities poses significant challenges in their detection and identification. Existing methods, such as…”
    Get full text
    Journal Article
  13. 13

    Deep Dilated Convolution on Multimodality Time Series for Human Activity Recognition by Xi, Rui, Hou, Mengshu, Fu, Mingsheng, Qu, Hong, Liu, Daibo

    “…Convolutional Neural Networks (CNNs) is capable of automatically learning feature representations, CNN-based recognition algorithm has been an alternative…”
    Get full text
    Conference Proceeding
  14. 14

    WiShield: Privacy Against Wi-Fi Human Tracking by Hu, Jingyang, Jiang, Hongbo, Chen, Siyu, Zhang, Qibo, Xiao, Zhu, Liu, Daibo, Liu, Jiangchuan, Li, Bo

    “…Wi-Fi signals contain information about the surrounding propagation environment and have been widely used in various sensing applications such as gesture…”
    Get full text
    Journal Article
  15. 15

    Toward Accurate Vehicle State Estimation Under Non-Gaussian Noises by Xiao, Zhu, Xiao, Dapeng, Havyarimana, Vincent, Jiang, Hongbo, Liu, Daibo, Wang, Dong, Zeng, Fanzi

    Published in IEEE internet of things journal (01-12-2019)
    “…Vehicle state including location and motion information plays an important role in various applications such as Internet of Vehicles (IoV), autonomous cars,…”
    Get full text
    Journal Article
  16. 16

    PupilRec: Leveraging Pupil Morphology for Recommending on Smartphones by Shen, Xiangyu, Jiang, Hongbo, Liu, Daibo, Yang, Kehua, Deng, Feiyang, Lui, John C. S., Liu, Jiangchuan, Dustdar, Schahram, Luo, Jun

    Published in IEEE internet of things journal (2022)
    “…As mobile shopping has gradually become the mainstream shopping mode, recommendation systems are gaining an increasingly wide adoption. Existing recommendation…”
    Get full text
    Journal Article
  17. 17

    Adaptive Retransmission Layer for Duty Cycle Wireless Networks by Liu, Daibo, Hou, Mengshu, Cao, Zhichao, Wang, Jiliang

    Published in IEEE transactions on vehicular technology (01-12-2018)
    “…In large-scale industrial wireless sensor networks (IWSNs), retransmission strategies are widely adopted to guarantee the reliability of multihop forwarding…”
    Get full text
    Journal Article
  18. 18

    Chase++: Fountain-Enabled Fast Flooding in Asynchronous Duty Cycle Networks by Cao, Zhichao, Wang, Jiliang, Liu, Daibo, Ma, Qiang, Miao, Xin, Mao, Xufei

    Published in IEEE/ACM transactions on networking (01-02-2021)
    “…Due to limited energy supply on many Internet of Things (IoT) devices, asynchronous duty cycle radio management is widely adopted to save energy. Flooding is a…”
    Get full text
    Journal Article
  19. 19

    Silent Thief: Password Eavesdropping Leveraging Wi-Fi Beamforming Feedback from POS Terminal by Chen, Siyu, Jiang, Hongbo, Hu, Jingyang, Xiao, Zhu, Liu, Daibo

    “…Nowadays, point-of-sale (POS) terminals are no longer limited to wired connections, and many of them rely on Wi-Fi for data transmission. While Wi-Fi provides…”
    Get full text
    Conference Proceeding
  20. 20

    LipAuth: Securing Smartphone User Authentication with Lip Motion Patterns by Kuang, Ling, Zeng, Fanzi, Liu, Daibo, Cao, Hangcheng, Jiang, Hongbo, Liu, Jiangchuan

    Published in IEEE internet of things journal (01-01-2024)
    “…Modern smartphones hold massive amounts of private and potentially sensitive user data (e.g., identity and messages). User authentication is the key measure to…”
    Get full text
    Journal Article