Jie Yang 

Assistant Professor

Department of Computer Science and Engineering               Office: 108 Dodge Hall of Engineering Building
Oakland University                                                              Email: yang at oakland.edu
Rochester, Michigan 48309                                                 Phone: 248-370-2246


Bio Sketch | News | Research Grant | Honors & Awards | Publications | Projects | Teaching | Professional Activities

I am looking for highly motivated PhD students starting in Spring'14 or Fall'14 . If you are interested in my research area, please send me email with your CV and transcripts.


Research Interests

 My research is funded by:

  • National Science Foundation (NSF)
  • Army Research Office (ARO)

  • Oakland University

 

                                                 


News and Highlights

 


Honors & Awards
  • Best Paper Runner-up Award, IEEE Conference on Communications and Network Security (CNS) 2013.
  • Faculty Research Fellowship Award, Oakland University, 2012
  • Best Paper Award, ACM International Conference on Mobile Computing and Networking (MobiCom), 2011
  • Francis T. Boesch Award, Stevens Institute of Technology, 2011
  • Graduate Student Award, New Jersey Inventors Hall of Fame, 2011
  • ACM MobiCom Student Travel Grant, 2010, 2011
  • Outstanding Research Award, Stevens Institute of Technology, 2009
  • Best Poster Award, IEEE Wireless and Optical Communications Conference (IEEE WOCC), 2009
  • Innovation & Entrepreneurship Doctoral Fellowship, Stevens Institute of Technology, 2007~2010

●Home


 Current Projects

Wireless Security. As the increasingly pervasive wireless networks make it even easier to conduct attacks for new and rapidly evolving adversaries, the ubiquity of wireless imposes new challenges on classical security measures such as cryptography. Thus, there is an urgent need to seek security solutions that can defend against attacks across the current heterogeneous mixes of wireless technologies. One of the promising ideas is to exploit the wireless channel physical layer information for providing trustworthy and reliable future wireless networks.  In this project, we exploit the wireless channel physical layer information to assist cryptographic-based methods to solve fundamental security problems such as detecting identity-based attacks and providing location-aware secure access of network resources..

   

Driving Safety. Cell phone distractions have been a factor in high-profile accidents and are associated with a large number of automobile accidents. This project addresses the fundamental problem of distinguishing between a driver and passenger using a mobile phone, which is the critical input to enable numerous safety and interface enhancements for the driver distraction problem. We are building a detection system that leverages the existing car stereo infrastructure, e.g., the speakers and Bluetooth network. Our solution seeks to address major challenges including the complex multipath environment presented in the small confided space inside a car, minimizing interference between the speakers, and any sounds emitted should be unobtrusive to minimize distraction. This project has received the Best Paper Award in ACM MobiCom 2011.

Press Release: MIT Technology Review, The Wall Street Journal, CNET News, Yahoo News, Autoblog, Stevens News...

   

Passive Intrusion Learning in Pervasive Wireless Environments. This project seeks to develop effective and scalable multi-modal passive intrusion learning techniques that have the capability to detect and track device-free moving objects in pervasive wireless environments through adaptive learning. In contrast to traditional techniques, which require pre-deployment of specialized hardware, and thus not easily deployed for unscheduled tasks and may not be scalable, this project leads to new insights into intrusion learning by mining on wireless environmental data, as well as leading to new approaches to device-free wireless localization, which can be used to assist a broad array of applications, e.g., identification of people trapped in a fire building during emergency evacuation.

Wireless Localization Systems. Mobile apps, especially those location based ones, are changing the way people work and live every day, and many such apps have to deal with an indoor environment, e.g., shopping malls and airports. In many such environments, the availability of indoor location information can be used to help individuals (directions, just-in-time coupons/promotions) and organizations (passenger flow distribution in airports, customer shopping/movements' pattern in malls). All these apps would require a practical, robust and efficient smartphone indoor localization solution. We are studying a practical and energy efficient indoor localization solution leveraging multiple sensing modalities enabled by smartphones.

●Home


Teaching

  • Winter 2014: CSE 232 - C++ for Programmers
  • Winter 2014: CSE 142 - Intro to C Programming & Unix
  • Fall 2013: CIT 448 Information Security Practice
  • Winter 2013: CSE 232 - C++ for Programmers
  • Winter 2013: CSE 142 - Intro to C Programming & Unix
  • Fall 2012: CSE/CIT 247: Introduction to Computer Networks
  • Winter 2011: CPE/EE 556: Computing Principles for Embedded Systems [ Syllabus]
  • Fall 2011: CPE/EE 556: Computing Principles for Embedded Systems [ Syllabus]


Publications 

Book

  1. Pervasive Wireless Environments: Detecting and Localizing User Spoofing,
    J. Yang, Y. Chen, W. Trappe, J. Cheng
    ISBN 978-3-319-07356-9, Springer, 2014.

Book Chapters

  1. Defending Against Identity-Based Attacks in Wireless Networks
    Yingying Chen and Jie Yang
    Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, Sajal Das, Krishna Kant and Nan Zhang (eds.), Morgan Kauffman, chapter 2-4, Feb., 2012.
     
  2. On the Performance of Wireless Indoor Localization Using Received Signal Strength
    Jie Yang, Yingying Chen, R. P. Martin, and M. Gruteser
    Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE, chapter 12, Nov., 2011.

     
  3. Impact of Anchor Placement and Anchor Selection on Localization Accuracy
    Yingying Chen, Jie Yang, Wade Trappe and R. P. Martin
    Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE, chapter 13, Nov., 2011.
     

Journal Papers and Magazine Articles

  1. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
    J. Yang, Y. Chen, W. Trappe and J. Cheng,
    IEEE Transactions on Parallel & Distributed Systems
    (IEEE TPDS),  Volume 24, No.1, Pages 44-58, 2013.
     
  2. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation
    H. Liu, J. Yang, Y. Wang, Y. Chen, and C. E. Koksal
    IEEE Transactions on Mobile Computing (IEEE TMC), to appear.
     
  3. Accurate WiFi Based Localization for Smartphones Using Peer Assistance
    H. Liu, J. Yang, S. Sidhom, Y. Wang, Y. Chen and F. Ye
    IEEE Transactions on Mobile Computing (IEEE TMC), 2013.
     
  4. A Study of Localization Accuracy using Multiple Frequencies and Powers
    X. Zheng, H. Liu, J. Yang, Y. Chen, R. P. Martin and X. Li
    IEEE Transactions on Parallel & Distributed Systems (IEEE TPDS), Volume 25, No.8, Pages 1955-1965, 2014.
     
  5. Sensing Driver Phone Use with Acoustic Ranging Through Car Speakers
    J. Yang, S. Sidhom, G. Chandrasekaran, T. Vu, H. Liu, N. Cecan, Y. Chen, M. Gruteser and R. P. Martin
    IEEE Transactions on Mobile Computing (IEEE TMC),
    Volume11, NO.9, Pages 1426-1440, 2012.
     
  6. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks
    Y. Chen, J. Yang, W. Trappe and R. P. Martin
    IEEE Transactions on Vehicular Technology (
    IEEE TVT), vol.59, no.5, pp.2418-2434, 2010.
     
  7. Empirical Evaluation of Wireless Localization When Using Multiple Antennas
    K. Kleisouris, Y. Chen, J. Yang and R. P. Martin
    IEEE Transactions on Parallel and Distributed Systems
    (IEEE TPDS), vol.21, no.11, pp.1595-1610, 2010.
     
  8. DECODE: Exploiting Shadow Fading to DEtect COMoving Wireless DEvices
    G. Chandrasekaran, Mesut Ergin, Marco Gruteser, Rich Martin, Jie Yang and Yingying Chen
    IEEE Transactions on Mobile Computing
    (
    IEEE TMC), vol. 8, no. 12, pp. 1663-1675, 2009.
     
  9. Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones
    Y. Ren, J. Yang, M. C. Chuah, and Y. Chen
    Ad Hoc & Sensor Wireless Networks (AHSWN), to appear.
     
  10. Achieving Robust Wireless Localization Resilient to Signal Strength Attacks
    X. Li, Y. Chen, J. Yang, X, Zheng
    Wireless Networks (WINET), Springer, Volume 18, Issue 1, Page 45-58
    , 2012.
     
  11. Towards Attack Resistant Localization under Infrastructure Attacks
    J. Yang and Y. Chen
    Security and Communication Networks (SCN), Wiley, DOI: 10.1002/sec.323,
    Volume 5, No.4, Pages 384-403, 2012.
     
  12. A Social Community Based Approach for Reducing the Propagation of Infectious Diseases in Healthcare
    Jie Yang, Yanzhi Ren, Yingying Chen and M. C. Chuah
    ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Vol. 14, Issue 3, Pages 7 -9, 2010.
     
  13. Improving Localization Accuracy of RSS-Based Lateration Methods in Indoor Environments
    Jie Yang and Yingying Chen and Jerry Cheng
    Ad Hoc & Sensor Wireless Networks (AHSWN),
    vol.11 , no.3-4 , pp.307-329, 2011
    .
     
  14. Detecting Wormhole Attacks in Delay Tolerant Networks
    Yanzhi Ren, M. C. Chuah, Jie Yang and Yingying Chen
    IEEE Wireless Communications Magazine
    (IEEE WCM), vol.17, no.5, pp.36-42, October 2010.
  15. A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks
    Yingying Chen, Wang Hui, Xiuyuan Zheng and Jie Yang,
    EURASIP Journal on Wireless Communications and Networking
    (JWCN),
    vol. 2010 (319275)
    ,

    wordpress stats plugin
    , Jun. 2010.

  16. Fast object recognition using local scale-invariant features
    Zhiqian Zhou, Bo Wang, Jie Yang, and Ji Lu
    Optical Technique, vol. 34, no. 5, pp. 742 C 745, 2008.

Selected Conference Publications

  1. E-eyes: Device-free Location-oriented Activity Identification Using Fine-grained WiFi Signatures
    Y. Wang, J. Liu, Y. Chen, M. Gruteser, J. Yang, H. Liu
    Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom 2014), Maui, Hawii, Sept. 2014.

     
  2. Tracking Human Queues Using Single-Point Signal Monitoring
    Y. Wang, J. Yang, Y. Chen, H. Liu, M. Gruteser, R. P. Martin
    Proceedings of the 12th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2014), New Hampshire, USA, June 2014.(Acceptance rate: 25/185 = 13.5%)
     
  3. Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information
    X. Zheng, W. Chen, Y. Chen, J. Yang
    Proceedings of the 2nd IEEE Conference on Communications and Network Security (CNS 2014), October, San Francisco, CA, 2014
     
  4. Practical User Authentication Leveraging Channel State Information
    H. Liu, Y. Wang, J. Liu, J. Yang and Y. Chen
    Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, June 2014. (Acceptance rate: 52/260 = 20%)
     
  5. Multi-lateral Privacy-Preserving Localization in Pervasive Environments
    T. Shu, Y. Chen, J. Yang and A. Williams
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2014), Toronto, Canada, April 2014. (Acceptance rate: 19%)
     
  6. SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments
    H. Han, J. Yu, H. Zhu, Y. Chen, Jie Yang, G. Xue, Y. Zhu, M. Li
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2014), Toronto, Canada, April 2014. (Acceptance rate: 19%)
     
  7. Robot-Assisted Human Indoor Localization Using the Kinect Sensor and Smartphones
    C. Jiang, M. Fahad, Y. Guo, J. Yang, Y. Chen,
    Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2014), Chicago, Sept., 2014.
     
  8. Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing
    Y. Ren, Y. Chen, J. Yang, B. Xie
    Proceedings of the I
    IEEE Global Communications Conference - Communication and Information System Security Symposium (Globecom 2014), Texas, USA, Dec., 2014.
     
  9. Sensing Vehicle Dynamics for Determining Driver Phone Use
    Y. Wang, J. Yang, H. Liu, Y. Chen, M. Gruteser, R. P. Martin,
    Proceedings of the 11th International Conference on Mobile Systems, Applications, and Services (MobiSys 2013), Taipei, Taiwan, June 2013. (Acceptance rate: 33/210=15.7%)
     
  10. E3: Energy-Efficient Engine for Frame Rate Adaptation on Smartphones
    H. Han, J. Yu, H. Zhu, Y. Chen, J. Yang, G. Xue, Y. Zhu, M. Li
    Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys 2013), Rome, Italy, November 2013.(Acceptance rate: 21/123 = 17%)
     
  11. Measuring Human Queues using WiFi Signals
    Y. Wang, J. Yang, Y. Chen, H. Liu, M. Gruteser, R. P. Martin
    ACM Annual International Conference on Mobile Computing and Networking (MobiCom 2013), Pages 235-238, Poster Session, Miami, Sept. 2013. C Winner of Student Research Competition
     
  12. Fast and Practical Secret Key Extraction by Exploiting Channel Response
    H. Liu, Y. Wang, J. Yang, Y. Chen
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2013), Turin, Italy, April 2013. (Acceptance rate: 17%)
     
  13. Adaptive Device-Free Passive Localization Coping with Dynamic Target Speed
    X. Zheng, J. Yang, Y. Chen, Y. Gan
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2013), mini-conference, Turin, Italy, April 2013. (Acceptance rate: 25%)
     
  14. Proactive Call Drop Avoidance in UMTS Networks
    S. Zhou, J. Yang, D. Xu, G. Li, Y. Jin, Z. Ge, M. Kosseifi, R. Doverspike, Y. Chen, L. Ying
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2013), mini-conference, Turin, Italy, April 2013. (Acceptance rate: 25%)

     
  15. Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming
    H. Liu, Y. Chen, M. C. Chuah, J. Yang
    Proceedings of IEEE Conference on Communications and Network Security (CNS 2013), Washington, D.C., USA, October 2013. -
    Best Paper Runner-up Award
     
  16. Smartphone Based User Verification Leveraging Gait Recognition for Mobile Healthcare Systems
    Y. Ren, Y. Chen, M. C. Chuah and J. Yang
    Proceedings of the the 10th Annual IEEE Communications Society Conference on Sensing and Communication in Wireless Networks (SECON 2013), New Orleans, USA
     
  17. Push the Limit of WiFi based Localization for Smartphones
    H. Liu, Y. Gan, J. Yang, S. Sidhom, Y. Wang, Y. Chen, F. Ye,
    Proceedings of the ACM Annual International Conference on Mobile Computing and Networking (MobiCom 2012), Istanbul, Turkey, Aug 2012. (Acceptance rate: 32/212 = 15%)
     
  18. Collaborative Secret Key Extraction Leveraging Received Signal Strength in Mobile Wireless Networks
    H. Liu, J. Yang, Y. Wang and Y. Chen
    Proceedings of the IEEE Intl. Conference on Computer Communications (INFOCOM 2012), 2012. (Acceptance Rate: 278/1547 = 18%)
     
  19. Securing Mobile Location-based Services through Position Verification leveraging Key Distribution
    J. Yang, Y. Chen, S. Macwan, C. Serban, S. Chen, W. Trappe
    Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pages: 2694-2699, 2012.
     
  20. Detecting Driver Phone Use Leveraging Car Speakers
    J. Yang, S. Sidhom, G. Chandrasekaran, T. Vu, H. Liu, N. Cecan, Y. Chen, M. Gruteser and R. P. Martin
    Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom 2011), Las Vegas, Sept. 2011.(Acceptance rate: 29/214 = 13.5%).- Best Paper Award
     
  21. Designing Localization Algorithms Robust to Signal Strength Attacks
    X. Li, Y. Chen, J. Yang and X. Zheng
    IEEE International Conference on Computer Communications (INFOCOM 2011), mini-Conference, Shanghai, P.R. China, Mar. 2011. (Acceptance rate: 23.4%)
     
  22. Tracking Vehicular Speed Variations by Warping Mobile Phone Signal Strengths
    G. Chandrasekaran, Tam Vu, A. Varshavsky, M. Gruteser, R. P. Martin, J. Yang and Y. Chen
    IEEE International Conference Pervasive Computing and Communication (PerCom 2011), Seattle, USA, Mar. 2011. (Acceptance Rate: 11%)
     
  23. Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare
    Y. Ren, J. Yang, M. C. Chuah and Y. Chen
    IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2011), Valencia, Spain, 2011.
     
  24. Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching
    Y. Ren, M. C. Chuah, J. Yang and Y. Chen
    IEEE Global Communications Conference 2009  (GLOBECOM 2011), Houston, Texas, 2011.
     
  25. Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments
    Jie Yang, Yong Ge, Hui Xiong and Yingying Chen and Hongbo Liu
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2010), San Diego, USA, March, 2010. (Acceptance rate: 276/1575 = 17.5%)
     
  26. Accuracy Characterization of Cell Tower Localization
    Jie Yang, Alexander Varshavsky, Hongbo Liu, Yingying Chen and Marco Gruteser
    Proceedings of the ACM International Conference on Ubiquitous Computing (Ubicomp 2010), Denmark, 2010. (Acceptance rate: 39/202 = 19.3%) 
     
  27. Vehicular Speed Estimation using Received Signal Strength from Mobile Phones
    G. Chandrasekaran, Tam Vu, A. Varshavsky, M. Gruteser, R. Martin, Y. Chen, and J. Yang
    Proceedings of the ACM International Conference on Ubiquitous Computing (Ubicomp 2010), Denmark, 2010. (Acceptance rate: 39/202 = 19.3%)
     
  28. Characterizing the Impact of Multi-frequency and Multi-power on Localization Accuracy
    Xiuyuan Zheng, Hongbo Liu, Jie Yang, Yingying Chen, John-Austen Francisco, Richard Martin and Xiaoyan Li,
    IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2010), San Francisco, California, November 2010.
     
  29. Mobile Sensing Enabled Robust Detection of Security Threats in Urban Environments
    Jie Yang, Jerry Cheng and Yingying Chen
    International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (Qshine 2010), Houston, Texas, USA, November 2010.

     
  30. Passive Intrusion Detection in Wireless Networks by Exploiting Clustering-based Learning
    Jie Yang, Yingying Chen, Sachi Desai and Shafik Quoraishee
    Proceedings of SPIE, Vol. 7706, 770604 (2010), Orlando, Florida, USA, Apr., 2010.
     
  31. Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording
    Yanzhi Ren, M. C. Chuah, Jie Yang and Yingying Chen
    International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN 2010), held in conjunction with WoWMoM, Montreal, QC, Canada, June 2010.
     
     
  32. MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
    Yanzhi Ren, M.-C. Chuah, Jie Yang and Yingying Chen
    IEEE Wireless Communications and Networking Conference 2010 (WCNC 2010), Sydney, Australia, April, 2010.
     
  33. Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks
    Jie Yang, Yingying Chen, Wade Trappe and Jerry Cheng
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2009), Brazil, April 2009. (Acceptance rate: 282/1435 = 19.7%)
     
  34. Detecting Spoofing Attacks in Mobile Wireless Environments
    Jie Yang, Yingying Chen and Wade Trappe
    IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (
    SECON 2009), Rome, Italy, June 2009. (Acceptance rate: 81/431 = 18.8%)
     
  35. Empirical Evaluation of the Limits on Localization using Signal Strength
    G. Chandrasekaran, Mesut Ali Ergin, Jie Yang, Song Liu, Yingying Chen, Marco Gruteser and Richard Martin
    IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (
    SECON 2009), Rome, Italy, June 2009. (Acceptance rate: 81/431 = 18.8%)

     
  36. Indoor Localization Using Improved RSS-Based Lateration Methods
    Jie Yang, Yingying Chen
    IEEE Global Communications Conference 2009 Wireless Networking Symposium (Globecom 2009), Hawaii, USA, November, 2009.
     
  37. Robust Wireless Localization to Attacks on Access Points
    Jie Yang, Yingying Chen, Victor Lawrence and Venkataraman Swaminathan
    IEEE Sarnoff Symposium 2009 (Sarnoff 2009), Princeton, NJ, April 2009.
     
  38. Prediction of Near Likely Sensors in Data-Centric Mobile Sensor Networks
    Yingying Chen, Hui Wang, Xiuyuan Zheng and Jie Yang
    IEEE Military Communication Conference (MILCOM 2009), Boston, MA, October 2009.
     
     
  39. Using a Multiple Analytical Distribution Filter for Underwater Localization
    D. Kruger, Hongyuan Shi, Yingying Chen, Hongbo Liu, Jie Yang and L. Imas
    Proceedings of SPIE 7480, 74800T (2009), Berlin, Germany, August, 2009. 

     
  40. The Impact of Using Multiple Antennas on Wireless Localization
    K. Kleisouris, Yingying Chen, Jie Yang, Richard P. Martin
    IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (
    SECON 2008), CA, USA, June 2008. (Acceptance rate: 64/304 = 21% )
     
  41. Detecting Sybil Attacks in Wireless and Sensor Networks Using Cluster Analysis
    Jie Yang, Yingying Chen and Wade Trappe
    IEEE International Workshop on Wireless and Sensor Networks Security (WSNS 2008), held in conjunction with MASS 2008.

     
  42. A Theoretical Analysis of Wireless Localization Using RF-based Fingerprint Matching
    Jie Yang and Yingying Chen
    IEEE International Workshop on System Management Techniques, Processes, and Services (SMTPS 2008), held in conjunction with IPDPS,
     Miami, Fl, USA, April 2008.

  43. DECODE: Detecting Co-Moving Wireless Devices
    G. Chandrasekaran, Mesut Ergin, Marco Gruteser, Rich Martin, Jie Yang and Yingying Chen
    IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2008), Atlanta, GA, September 2008.

     
  44. A Trusted Infrastructure for Facilitating Access Control Location Information
    Yingying Chen, Jie Yang and Fangming He
    IEEE Military Communication Conference (MILCOM 2008), San Diego, CA, November 2008.  

     
  45. NORM: A Decentralized Location Verification Mechanism for Wireless Sensor Networks
    Yingying Chen, Jie Yang, Xiuyuan Zheng and Venkataraman Swaminathan
    26th Army Science Conference, Orlando, FL, December 2008.

●Home


Professional Activities

  • Program Chair
    • TPC Co-Chair: The First International Workshop on Resource Management of Cloud Computing (CCRM 2013), Co-located with ICDCS 2013
    • Session Chair: IEEE International Conference on Distributed Computing Systems (ICDCS), 2013
  • Program Committee Member
    • IEEE International Conference on Computer Communications (INFOCOM), 2014, 2015
    • IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), 2014
    • IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), 2014
    • International Conference on Mobile Systems and Pervasive Computing (MobiSPC), 2014
    • IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), 2013
    • IEEE International Conference on Distributed Computing Systems (ICDCS), 2013
    • International Conference on Body Area Networks (BodyNet), 2013
    • IEEE Global Communications Conference--Next Generation Networking Symposium (GLOBECOM), 2013, 2014
    • IEEE International Conference on Connected Vehicles & Expo (ICCVE), 2013, 2014
    • IEEE Wireless Communications and Networking Conference (WCNC), 2012, 2013, 2014
    • IEEE International Conference on Computer Communications and Networks (ICCCN), 2012
    • The 2012 Summer FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-Summer), 2012
  • Reviewer for conference:
    • MobiHoc'14, UbiComp'13, INFOCOM'09, '10, '11, '12;  ICDCS'09,'10, '11, '12; Wisec'10, '11, 12'; Percom'10;  Mobisys'09; Ubicomp'09; Pervasive'08; SecureComm'09; ICC'09, '10; Globecom '08, '09,'10,'11,'12; WCNC '09, '10,'11; VTC '10; ChinaCom '09; ICCC'09; ICCCN'09; SSN'09.
  • Reviewer for journals:
    • ACM/IEEE Transactions on Networking (ToN)
    • ACM Transactions on Information and System Security (TISSEC)
    • IEEE Transactions on Mobile Computing (TMC)
    • IEEE Transactions on Parallel and Distributed Systems (TPDS)
    • ACM Transactions on Sensor Networks (ToSN)
    • IEEE Transactions on Information Forensics & Security (TIFS)
    • IEEE Journal on Selected Areas in Communications (JSAC)
    • IEEE Journal of Selected Topics in Signal Processing (J-STSP)
    • IEEE Transactions on Wireless Communications (TWC)
    • IEEE Transactions on Vehicular Technology (TVT)
    • IEEE Internet of Things Journal
    • IEEE Network Magazine
    • IEEE Wireless Communications
    • Physical Communication - Journal - Elsevier
    • Journal of Communications
    • International Journal of Security and Networks
    • International Journal of Distributed Sensor Networks
    • Journal of Communications and Networks
    • Computer Communications
    • Sensors
    • ACM Wireless Networks (WINT)
    • ACM Mobile Networking and Applications (MONET)
    • Wireless Communications and Mobile Computing (WCMC)
    • Computer Networks (Elsevier),
    • Ad Hoc Networks Journal (Elsevier),
    • Security and Communication Networks (Wiley)


wordpress stats plugin