Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Liangyi Gong"'
Publikováno v:
IEEE Access, Vol 7, Pp 92758-92767 (2019)
Contactless gesture recognition is an emerging interactive technique in ubiquitous and mobile computing. It combines the linguistics with the wireless signals to analyze, judge, and integrate human gestures by the usage of intelligent algorithms. The
Externí odkaz:
https://doaj.org/article/4528ecddca26420d9745b0d829f52987
Publikováno v:
IEEE Access, Vol 6, Pp 9091-9098 (2018)
With the development of 5G and Internet of Vehicles technology, the possibility of remote wireless attack on an in-vehicle network has been proven by security researchers. Anomaly detection technology can effectively alleviate the security threat, as
Externí odkaz:
https://doaj.org/article/b929a37865624fddbe1e1deca0b7da5d
Autor:
Xiaochen Fan, Xiangjian He, Chaocan Xiang, Deepak Puthal, Liangyi Gong, Priyadarsi Nanda, Gengfa Fang
Publikováno v:
IEEE Access, Vol 6, Pp 47535-47545 (2018)
With the explosive usage of smart mobile devices, sustainable access to wireless networks (e.g., Wi-Fi) has become a pervasive demand. Most mobile users expect seamless network connection with low cost. Indeed, this can be achieved by using an accura
Externí odkaz:
https://doaj.org/article/c7b99ecc6a42453ab3d31431b2cd5def
Publikováno v:
Sensors, Vol 15, Iss 12, Pp 32213-32229 (2015)
With the rapid development of WLAN technology, wireless device-free passive human detection becomes a newly-developing technique and holds more potential to worldwide and ubiquitous smart applications. Recently, indoor fine-grained device-free passiv
Externí odkaz:
https://doaj.org/article/6695e0fd170446d6a557ce069c547e70
Publikováno v:
Applied Sciences, Vol 9, Iss 1, p 175 (2019)
WiFi infrastructures are widely deployed in both public and private buildings. They make the connection to the internet more convenient. Recently, researchers find that WiFi signals have the ability to sense the changes in the environment that can de
Externí odkaz:
https://doaj.org/article/d2f478e09b0b43a2a220cd858b060a93
Publikováno v:
Sensors, Vol 18, Iss 3, p 878 (2018)
With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These fo
Externí odkaz:
https://doaj.org/article/77fad59dcd634d3a9bbf36a6ceb3eaf8
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 11 (2015)
Device-free passive localization (DFPL) has been an emerging application with fast increasing development. Channel State Information- (CSI-) based DFPL is recently paid more attention to for fine-granularity and stability of CSI. However, lots of dea
Externí odkaz:
https://doaj.org/article/ba7e2724247249c4bef6980b763be0f0
Publikováno v:
Entropy, Vol 19, Iss 2, p 65 (2017)
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static det
Externí odkaz:
https://doaj.org/article/f99f5c32098f4466a5e91208b36577df
Autor:
Lei Zhang, Wenyuan Huang, Xiaoxia Jia, Xiaojie Fan, Xiaochen Fan, Liangyi Gong Liangyi Gong, Wenyuan Tao, Shiwen Mao
Publikováno v:
IEEE Internet of Things Journal. 9:24051-24064
Practicing gymnastics activities at home with online resources has become an increasingly popular choice due to its convenience and accessibility. However, without face-to-face guidance by a trainer, a major challenge is how to assess the quality of
Publikováno v:
IEEE Transactions on Mobile Computing. 21:4488-4501
Android overlay enables one app to draw over other apps by creating an extra View layer atop the host View, which nevertheless can be exploited by malicious apps (malware) to attack users. To combat this threat, prior countermeasures concentrate on r