


default search action
Hongbo Liu 0002
Person information
- affiliation: Indiana University - Purdue University Indianapolis, Department of Computer Information and Graphics, IN, USA
- affiliation: University of Electronic Science and Technology of China, Chengdu, China
Other persons with the same name
- Hongbo Liu (aka: Hong-bo Liu) — disambiguation page
- Hongbo Liu 0001
— Dalian Maritime University, Institute of Cognitive Intelligence Technology, China
- Hongbo Liu 0003
(aka: Hong-bo Liu 0003) — Zhejiang University, Ocean College, Zhoushan, China
- Hongbo Liu 0004 — University of Pennsylvania, Perelman School of Medicine, Philadelphia, PA, USA (and 1 more)
- Hongbo Liu 0005 — Rutgers University, WINLAB, North Brunswick, NJ, USA (and 1 more)
- Hongbo Liu 0006
— Northeast Electric Power University, College of Electrical Engineering, Jilin, China (and 1 more)
- Hongbo Liu 0007 — CVTE Research, Guangzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j41]Huan Dai
, Yuefeng Chen
, Yicong Du
, Luping Wang
, Ziyu Shao
, Hongbo Liu
, Yanzhi Ren
, Jiadi Yu
, Bo Liu
:
ArmSpy++: Enhanced PIN Inference through Video-based Fine-grained Arm Posture Analysis. ACM Trans. Priv. Secur. 28(1): 2:1-2:26 (2025) - [j40]Yicong Du
, Huan Dai
, Hongbo Liu
, Guyue Li
, Yanzhi Ren
, Ke Zhang
:
Efficient and Error-Free Secret Key Generation Leveraging Sorted Indices Matching. IEEE Trans. Mob. Comput. 24(2): 779-793 (2025) - 2024
- [j39]Yuchen Su
, Shiyue Huang
, Hongbo Liu
, Yuefeng Chen
, Yicong Du
, Yan Wang
, Yanzhi Ren
, Yingying Chen
:
PPG-Hear: A Practical Eavesdropping Attack with Photoplethysmography Sensors. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(2): 82:1-82:28 (2024) - [j38]Hongbo Liu, Yingying Chen, Wenyuan Xu, Zhenhua Liu, Yuchen Su:
Topology-based multi-jammer localization in wireless networks. Secur. Saf. 3: 2023025 (2024) - [j37]Shiyu Li
, Yuan Zhang
, Yaqing Song
, Hongbo Liu
, Nan Cheng
, Dahai Tao, Hongwei Li
, Kan Yang
:
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery. IEEE Trans. Inf. Forensics Secur. 19: 6425-6440 (2024) - [j36]Yanzhi Ren
, Chen Chen
, Hongbo Liu
, Jiadi Yu
, Zhourong Zheng, Yingying Chen
, Pengcheng Huang, Hongwei Li
:
Secure Mobile Two-Factor Authentication Leveraging Active Sound Sensing. IEEE Trans. Mob. Comput. 23(2): 1262-1277 (2024) - [j35]Yanzhi Ren
, Siyi Li
, Chen Chen
, Hongbo Liu
, Jiadi Yu
, Yingying Chen
, Haomiao Yang
, Hongwei Li
:
Robust Indoor Location Identification for Smartphones Using Echoes From Dominant Reflectors. IEEE Trans. Mob. Comput. 23(5): 5310-5326 (2024) - [j34]Yicong Du
, Huan Dai
, Hongbo Liu
, Yan Wang
, Guyue Li
, Yanzhi Ren
, Yingying Chen
, Ke Zhang
:
Secret Key Generation Based on Manipulated Channel Measurement Matching. IEEE Trans. Mob. Comput. 23(10): 9532-9548 (2024) - [j33]Zhiliang Xia
, Yanzhi Ren
, Siyi Li
, Jiachen Ou
, Hongbo Liu
, Yingying Chen
, Shu Fu
, Hongwei Li
:
Indoor Location Identification for Smart Speakers Leveraging 3-D Acoustic Images. IEEE Trans. Mob. Comput. 23(12): 10720-10733 (2024) - [j32]Yanzhi Ren
, Tingyuan Yang
, Zhiliang Xia
, Hongbo Liu
, Jiadi Yu
, Bo Liu
, Hongwei Li
:
Robust Mobile Two-Factor Authentication Leveraging Acoustic Fingerprinting. IEEE Trans. Mob. Comput. 23(12): 11105-11120 (2024) - [j31]Yicong Du
, Hongbo Liu
, Ziyu Shao
, Yanzhi Ren
, Shuai Li
, Huan Dai
, Jiadi Yu
:
Secure and Controllable Secret Key Generation Through CSI Obfuscation Matrix Encapsulation. IEEE Trans. Mob. Comput. 23(12): 12313-12329 (2024) - [j30]Huanqi Yang
, Di Duan
, Hongbo Liu
, Chengwen Luo
, Yuezhong Wu, Wei Li
, Albert Y. Zomaya
, Linqi Song
, Weitao Xu
:
Scenario-Adaptive Key Establishment Scheme for LoRa-Enabled IoV Communications. IEEE Trans. Mob. Comput. 23(12): 12998-13014 (2024) - [c52]Shiyue Huang, Yuchen Su, Hongbo Liu, Huan Dai, Bo Liu:
Heart of Betrayal: A PIN Inference Attack Leveraging Photoplethysmography on Wearables. CSCWD 2024: 2571-2576 - [c51]Yicong Du, Limin Liu, Hongbo Liu, Yanzhi Ren, Bo Liu:
Secret Key Generation with Adaptive Pilot Manipulation for Matching-Based Method. ICC 2024: 2688-2693 - [c50]Hao Kong, Haoxin Lyu, Jiadi Yu, Linghe Kong
, Junlin Yang, Yanzhi Ren, Hongbo Liu, Yingying Chen:
mmHand: 3D Hand Pose Estimation Leveraging mmWave Signals. ICDCS 2024: 1062-1073 - [c49]Limin Liu, Hongbo Liu, Yicong Du, Ziyu Shao, Haomiao Yang, Yanzhi Ren:
Physical Layer Secret Key Generation Leveraging Proactive Pilot Contamination. ICDCS 2024: 1272-1282 - [c48]Changming Li
, Mingjing Xu
, Yicong Du
, Limin Liu
, Cong Shi
, Yan Wang
, Hongbo Liu
, Yingying Chen
:
Practical Adversarial Attack on WiFi Sensing Through Unnoticeable Communication Packet Perturbation. MobiCom 2024: 373-387 - 2023
- [c47]Yanzhi Ren, Zhiliang Xia
, Siyi Li
, Hongbo Liu, Yingying Chen, Shuai Li, Hongwei Li:
EchoImage: User Authentication on Smart Speakers Using Acoustic Signals. ICDCS 2023: 236-247 - [c46]Yuchen Su, Guoqing Jiang, Yicong Du
, Yuefeng Chen, Hongbo Liu, Yanzhi Ren, Huan Dai, Yan Wang, Shuai Li, Yingying Chen:
P2Auth: Two-Factor Authentication Leveraging PIN and Keystroke-Induced PPG Measurements. ICDCS 2023: 726-737 - [c45]Yanzhi Ren, Tingyuan Yang
, Zhiliang Xia
, Hongbo Liu, Yingying Chen, Nan Jiang, Zhaohui Yuan, Hongwei Li:
Secure and Robust Two Factor Authentication via Acoustic Fingerprinting. INFOCOM 2023: 1-10 - [c44]Huanqi Yang
, Zehua Sun
, Hongbo Liu, Xianjin Xia, Yu Zhang
, Tao Gu
, Gerhard Hancke, Weitao Xu
:
ChirpKey: A Chirp-level Information-based Key Generation Scheme for LoRa Networks via Perturbed Compressed Sensing. INFOCOM 2023: 1-10 - [i2]Shiyu Li, Yuan Zhang, Yaqing Song, Hongbo Liu, Nan Cheng, Hongwei Li, Dahai Tao, Kan Yang:
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery. IACR Cryptol. ePrint Arch. 2023: 1775 (2023) - 2022
- [j29]Huan Dai, Pengzhan Shi
, Hongbo Liu, Ruyu Chen, Zhenping Chen:
Electrical fire monitoring IoT framework for ancient architectural complex leveraging edge computing. Int. J. Commun. Syst. 35(17) (2022) - [j28]Chen Chen
, Yanzhi Ren
, Hongbo Liu
, Yingying Chen
, Hongwei Li
:
Acoustic-Sensing-Based Location Semantics Identification Using Smartphones. IEEE Internet Things J. 9(20): 20640-20650 (2022) - [j27]Huan Dai, Jingjing Jiang, Jiaju Ma, He Huang, Hongbo Liu:
Breathing-based continuous non-intrusive user verification leveraging commodity WiFi. J. Commun. Networks 24(2): 209-222 (2022) - [j26]Ke Zhang
, Hao Chen, Hong-Ning Dai
, Hongbo Liu
, Zhongrui Lin:
SpoVis: Decision Support System for Site Selection of Sports Facilities in Digital Twinning Cities. IEEE Trans. Ind. Informatics 18(2): 1424-1434 (2022) - [j25]Hongbo Liu
, Cong Shi
, Yingying Chen
:
Enabling Secret Key Distribution Over Screen-to-Camera Channel Leveraging Color Shift Property. IEEE Trans. Mob. Comput. 21(10): 3581-3594 (2022) - [j24]Binbin Su
, Wenjuan Yu
, Hongbo Liu, Arsenia Chorti
, H. Vincent Poor
:
Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping. IEEE Wirel. Commun. Lett. 11(5): 878-882 (2022) - [c43]Huanqi Yang
, Hongbo Liu, Chengwen Luo, Yuezhong Wu, Wei Li, Albert Y. Zomaya
, Linqi Song
, Weitao Xu
:
Vehicle-Key: A Secret Key Establishment Scheme for LoRa-enabled IoV Communications. ICDCS 2022: 787-797 - [c42]Ruiqiong Tong, Yicong Du
, Hongbo Liu, Yingying Chen:
An Improved Least-square based Jammer Localization Algorithm. ICPADS 2022: 258-265 - [c41]Guyue Li, Haiyu Yang, Junqing Zhang, Hongbo Liu, Aiqun Hu:
Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments. INFOCOM 2022: 1-10 - [c40]Xiangyu Xu, Jiadi Yu, Chengguang Ma, Yanzhi Ren, Hongbo Liu, Yanmin Zhu, Yingying Chen, Feilong Tang:
mmECG: Monitoring Human Cardiac Cycle in Driving Environments Leveraging Millimeter Wave. INFOCOM 2022: 90-99 - [c39]Yuefeng Chen, Yicong Du
, Chunlong Xu, Yanghai Yu, Hongbo Liu, Huan Dai, Yanzhi Ren, Jiadi Yu:
ArmSpy: Video-assisted PIN Inference Leveraging Keystroke-induced Arm Posture Changes. INFOCOM 2022: 1878-1887 - 2021
- [j23]Cong Shi, Jian Liu, Hongbo Liu, Yingying Chen:
WiFi-Enabled User Authentication through Deep Learning in Daily Activities. ACM Trans. Internet Things 2(2): 13:1-13:25 (2021) - [j22]Tianming Zhao
, Jian Liu
, Yan Wang
, Hongbo Liu
, Yingying Chen
:
Towards Low-Cost Sign Language Gesture Recognition Leveraging Wearables. IEEE Trans. Mob. Comput. 20(4): 1685-1701 (2021) - [c38]Yanzhi Ren, Zhourong Zheng, Hongbo Liu, Yingying Chen, Hongwei Li, Chen Wang:
Breathing Sound-based Exercise Intensity Monitoring via Smartphones. ICCCN 2021: 1-10 - [c37]Hongbo Liu, Yan Wang
, Yanzhi Ren, Yingying Chen:
Bipartite Graph Matching Based Secret Key Generation. INFOCOM 2021: 1-10 - [c36]Yanzhi Ren, Ping Wen, Hongbo Liu, Zhourong Zheng, Yingying Chen, Pengcheng Huang, Hongwei Li:
Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing. INFOCOM 2021: 1-10 - [i1]Guyue Li, Haiyu Yang, Junqing Zhang, Hongbo Liu, Aiqun Hu:
Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments. CoRR abs/2112.02273 (2021) - 2020
- [j21]Chen Wang, Yan Wang
, Yingying Chen, Hongbo Liu
, Jian Liu:
User authentication on mobile devices: Approaches, threats and trends. Comput. Networks 170: 107118 (2020) - [j20]Jian Liu
, Hongbo Liu
, Yingying Chen
, Yan Wang
, Chen Wang
:
Wireless Sensing for Human Activity: A Survey. IEEE Commun. Surv. Tutorials 22(3): 1629-1645 (2020) - [c35]Hongbo Liu, Zhihua Li, Yucheng Xie, Ruizhe Jiang, Yan Wang
, Xiaonan Guo, Yingying Chen:
LiveScreen: Video Chat Liveness Detection Leveraging Skin Reflection. INFOCOM 2020: 1083-1092
2010 – 2019
- 2019
- [j19]Yan Wang
, Yingying Chen
, Fan Ye, Hongbo Liu
, Jie Yang:
Implications of smartphone user privacy leakage from the advertiser's perspective. Pervasive Mob. Comput. 53: 13-32 (2019) - [j18]Li Lu
, Jiadi Yu
, Yingying Chen
, Hongbo Liu
, Yanmin Zhu
, Linghe Kong
, Minglu Li:
Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones. IEEE/ACM Trans. Netw. 27(1): 447-460 (2019) - [c34]Hongbo Liu, Zhihua Li, Yucheng Xie, Ruizhe Jiang, Yan Wang
, Xiaonan Guo, Yingying Chen:
Poster: Video Chat Scam Detection Leveraging Screen Light Reflection. MobiCom 2019: 92:1-92:3 - [c33]Jian Liu, Cong Shi, Yingying Chen, Hongbo Liu, Marco Gruteser:
CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping. MobiSys 2019: 249-261 - 2018
- [j17]Chuyu Wang, Jian Liu, Yingying Chen, Lei Xie, Hongbo Liu, Sanglu Lu:
RF-Kinect: A Wearable RFID-based Approach Towards 3D Body Movement Tracking. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(1): 41:1-41:28 (2018) - [j16]Xiaonan Guo, Jian Liu, Cong Shi, Hongbo Liu, Yingying Chen, Mooi Choo Chuah:
Device-free Personalized Fitness Assistant Using WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(4): 165:1-165:23 (2018) - [j15]Hongbo Liu
, Yan Wang, Jian Liu, Jie Yang, Yingying Chen
, H. Vincent Poor
:
Authenticating Users Through Fine-Grained Channel Information. IEEE Trans. Mob. Comput. 17(2): 251-264 (2018) - [c32]Chen Wang, Jian Liu, Yingying Chen
, Hongbo Liu, Yan Wang
:
Towards In-baggage Suspicious Object Detection Using Commodity WiFi. CNS 2018: 1-9 - [c31]Tianming Zhao
, Jian Liu, Yan Wang
, Hongbo Liu, Yingying Chen
:
PPG-based Finger-level Gesture Recognition Leveraging Wearables. INFOCOM 2018: 1457-1465 - [c30]Li Lu
, Jiadi Yu, Yingying Chen
, Hongbo Liu, Yanmin Zhu, Yunfei Liu, Minglu Li:
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals. INFOCOM 2018: 1466-1474 - [c29]Chuyu Wang, Jian Liu, Yingying Chen
, Hongbo Liu, Lei Xie, Wei Wang, Bingbing He, Sanglu Lu:
Multi - Touch in the Air: Device-Free Finger Tracking and Gesture Recognition via COTS RFID. INFOCOM 2018: 1691-1699 - 2017
- [j14]Hongbo Liu
, Yingying Chen
, Mooi Choo Chuah, Jie Yang, H. Vincent Poor
:
Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching. IEEE Trans. Dependable Secur. Comput. 14(4): 377-391 (2017) - [c28]Hongbo Liu, Bo Liu
, Cong Shi, Yingying Chen
:
Secret key distribution leveraging color shift over visible light channel. CNS 2017: 1-9 - [c27]Guo Liu, Jian Liu, Fangmin Li
, Xiaolin Ma, Yingying Chen
, Hongbo Liu:
SubTrack: Enabling Real-Time Tracking of Subway Riding on Mobile Devices. MASS 2017: 90-98 - [c26]Cong Shi
, Jian Liu, Hongbo Liu
, Yingying Chen
:
Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT. MobiHoc 2017: 5:1-5:10 - [c25]Xiaonan Guo, Bo Liu
, Cong Shi
, Hongbo Liu, Yingying Chen
, Mooi Choo Chuah:
WiFi-Enabled Smart Human Dynamics Monitoring. SenSys 2017: 16:1-16:13 - 2016
- [j13]Yan Wang
, Yingying (Jennifer) Chen
, Jie Yang, Marco Gruteser, Richard P. Martin, Hongbo Liu
, Luyang Liu, Çagdas Karatas
:
Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors. IEEE Trans. Mob. Comput. 15(8): 1965-1981 (2016) - [c24]Mostafa Izz, Zhong Yuan Li, Hongbo Liu
, Yingying Chen
, Feng Li:
Uber-in-light: Unobtrusive visible light communication leveraging complementary color channel. INFOCOM 2016: 1-9 - 2015
- [j12]Yan Wang, Yingying Chen, Jie Yang, Hongbo Liu, Marco Gruteser, Richard P. Martin:
A Low-Cost Wi-Fi-Based Solution for Measuring Human Queues. GetMobile Mob. Comput. Commun. 19(1): 10-13 (2015) - [j11]Wenlin Zhang, Yi Guo
, Hongbo Liu
, Yingying (Jennifer) Chen
, Zheng Wang, Joseph Mitola III:
Distributed Consensus-Based Weight Design for Cooperative Spectrum Sensing. IEEE Trans. Parallel Distributed Syst. 26(1): 54-64 (2015) - [c23]Yan Wang, Yingying Chen
, Fan Ye, Jie Yang, Hongbo Liu
:
Towards Understanding the Advertiser's Perspective of Smartphone User Privacy. ICDCS 2015: 288-297 - 2014
- [j10]Hongbo Liu
, Jie Yang, Simon Sidhom, Yan Wang, Yingying Chen
, Fan Ye:
Accurate WiFi Based Localization for Smartphones Using Peer Assistance. IEEE Trans. Mob. Comput. 13(10): 2199-2214 (2014) - [j9]Hongbo Liu
, Jie Yang, Yan Wang, Yingying (Jennifer) Chen
, Can Emre Koksal:
Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation. IEEE Trans. Mob. Comput. 13(12): 2820-2835 (2014) - [j8]Hongbo Liu
, Hui Wang, Yingying Chen
, Dayong Jia:
Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks. ACM Trans. Sens. Networks 10(3): 49:1-49:37 (2014) - [j7]Zhenhua Liu, Hongbo Liu
, Wenyuan Xu, Yingying Chen
:
An Error-Minimizing Framework for Localizing Jammers in Wireless Networks. IEEE Trans. Parallel Distributed Syst. 25(2): 508-517 (2014) - [j6]Xiuyuan Zheng, Hongbo Liu
, Jie Yang, Yingying Chen
, Richard P. Martin, Xiaoyan Li:
A Study of Localization Accuracy Using Multiple Frequencies and Powers. IEEE Trans. Parallel Distributed Syst. 25(8): 1955-1965 (2014) - [c22]Hongbo Liu
, Yan Wang, Jian Liu, Jie Yang, Yingying Chen
:
Practical user authentication leveraging channel state information (CSI). AsiaCCS 2014: 389-400 - [c21]Yan Wang, Jian Liu, Yingying Chen
, Marco Gruteser, Jie Yang, Hongbo Liu
:
E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures. MobiCom 2014: 617-628 - [c20]Yan Wang, Jie Yang, Yingying Chen
, Hongbo Liu
, Marco Gruteser, Richard P. Martin:
Tracking human queues using single-point signal monitoring. MobiSys 2014: 42-54 - 2013
- [j5]Xiuyuan Zheng, Yingying Chen, Hui Wang, Hongbo Liu
, Ruilin Liu:
Neighborhood prediction based decentralized key management for mobile wireless networks. Wirel. Networks 19(6): 1387-1406 (2013) - [c19]Hongbo Liu
, Yingying Chen
, Mooi Choo Chuah, Jie Yang:
Towards self-healing smart grid via intelligent local controller switching under jamming. CNS 2013: 127-135 - [c18]Hongbo Liu
, Yang Wang, Jie Yang, Yingying Chen
:
Fast and practical secret key extraction by exploiting channel response. INFOCOM 2013: 3048-3056 - [c17]Yan Wang, Jie Yang, Hongbo Liu
, Yingying Chen, Marco Gruteser, Richard P. Martin:
Measuring human queues using WiFi signals. MobiCom 2013: 235-238 - [c16]Yan Wang, Jie Yang, Hongbo Liu
, Yingying Chen
, Marco Gruteser, Richard P. Martin:
Sensing vehicle dynamics for determining driver phone use. MobiSys 2013: 41-54 - 2012
- [j4]Jie Yang, Simon Sidhom, Gayathri Chandrasekaran, Tam Vu, Hongbo Liu
, Nicolae Cecan, Yingying Chen
, Marco Gruteser, Richard P. Martin:
Sensing Driver Phone Use with Acoustic Ranging through Car Speakers. IEEE Trans. Mob. Comput. 11(9): 1426-1440 (2012) - [j3]Zhenhua Liu, Hongbo Liu
, Wenyuan Xu, Yingying Chen
:
Exploiting Jamming-Caused Neighbor Changes for Jammer Localization. IEEE Trans. Parallel Distributed Syst. 23(3): 547-555 (2012) - [c15]Hongbo Liu
, Jie Yang, Yan Wang, Yingying Chen
:
Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks. INFOCOM 2012: 927-935 - [c14]Zhenhua Liu, Hongbo Liu
, Wenyuan Xu, Yingying Chen
:
Error minimizing jammer localization through smart estimation of ambient noise. MASS 2012: 308-316 - [c13]Hongbo Liu
, Yu Gan
, Jie Yang, Simon Sidhom, Yan Wang, Yingying Chen
, Fan Ye:
Push the limit of WiFi based localization for smartphones. MobiCom 2012: 305-316 - [c12]Zhenhua Liu, Hongbo Liu
, Wenyuan Xu, Yingying Chen:
Extracting jamming signals to locate radio interferers and jammers. MobiHoc 2012: 257-258 - 2011
- [j2]Hongbo Liu
, Zhenhua Liu, Yingying Chen
, Wenyuan Xu:
Determining the position of a jammer using a virtual-force iterative approach. Wirel. Networks 17(2): 531-547 (2011) - [j1]Ruilin Liu, Xiuyuan Zheng, Hongbo Liu
, Wendy Hui Wang, Yingying Chen
:
Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks. Wirel. Networks 17(8): 1833-1850 (2011) - [c11]Wenlin Zhang, Zheng Wang, Yi Guo
, Hongbo Liu
, Yingying Chen
, Joseph Mitola III:
Distributed Cooperative Spectrum Sensing Based on Weighted Average Consensus. GLOBECOM 2011: 1-6 - [c10]Hongbo Liu
, Zhenhua Liu, Yingying Chen
, Wenyuan Xu:
Localizing Multiple Jamming Attackers in Wireless Networks. ICDCS 2011: 517-528 - [c9]Jie Yang, Simon Sidhom, Gayathri Chandrasekaran, Tam Vu, Hongbo Liu
, Nicolae Cecan, Yingying Chen
, Marco Gruteser, Richard P. Martin:
Detecting driver phone use leveraging car speakers. MobiCom 2011: 97-108 - 2010
- [c8]Hongbo Liu
, Wendy Hui Wang, Yingying Chen:
Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks. DCOSS 2010: 201-215 - [c7]Zhenhua Liu, Hongbo Liu
, Wenyuan Xu, Yingying Chen:
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges. DCOSS 2010: 348-361 - [c6]Jie Yang, Alexander Varshavsky, Hongbo Liu
, Yingying Chen
, Marco Gruteser:
Accuracy characterization of cell tower localization. UbiComp 2010: 223-226 - [c5]Jie Yang, Yong Ge, Hui Xiong, Yingying Chen
, Hongbo Liu:
Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments. INFOCOM 2010: 767-775 - [c4]Xiuyuan Zheng, Wendy Hui Wang, Yingying Chen
, Hongbo Liu
, Ruilin Liu:
A decentralized key management scheme via neighborhood prediction in mobile wireless networks. MASS 2010: 51-60 - [c3]Xiuyuan Zheng, Hongbo Liu
, Jie Yang, Yingying Chen
, John-Austen Francisco, Richard P. Martin, Xiaoyan Li:
Characterizing the impact of multi-frequency and multi-power on localization accuracy. MASS 2010: 156-165
2000 – 2009
- 2009
- [c2]Hongbo Liu, Wenyuan Xu, Yingying Chen
, Zhenhua Liu:
Localizing Jammers in Wireless Networks. PerCom Workshops 2009: 1-6 - 2008
- [c1]Hongbo Liu, Wei Zhang:
Self-localization based on improved subspace approach in wireless sensor network. AICCSA 2008: 349-354
Coauthor Index
aka: Yingying (Jennifer) Chen

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 21:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint