His primary areas of study are Computer network, Wireless, Real-time computing, Simulation and Authentication. His work carried out in the field of Computer network brings together such families of science as Wireless network and Cryptography. His Wireless network research incorporates themes from Node and Spoofing attack.
His studies in Wireless integrate themes in fields like Electromagnetic interference, Key generation, Communication channel, RSS and Algorithm. His Real-time computing study integrates concerns from other disciplines, such as Ranging, Bayesian network and Embedded system. The concepts of his Authentication study are interwoven with issues in Confidentiality and Process.
Yingying Chen mainly investigates Computer network, Real-time computing, Wireless, Mobile device and Artificial intelligence. His Computer network research is multidisciplinary, incorporating perspectives in Computer security, Cryptography and Wireless network. The various areas that Yingying Chen examines in his Wireless network study include Electromagnetic interference and Spoofing attack.
His research in Real-time computing intersects with topics in Ranging, Signal and Simulation. His study in Wireless is interdisciplinary in nature, drawing from both RSS and Communication channel. His Mobile device research incorporates elements of Wearable technology, Wearable computer, Robustness and Human–computer interaction.
Yingying Chen mostly deals with Human–computer interaction, Mobile device, Real-time computing, Authentication and Wearable computer. His Human–computer interaction research is multidisciplinary, incorporating elements of Identification, Gesture, Deep learning, Artificial intelligence and Exploit. His Mobile device research includes themes of Wearable technology, Control and Internet access.
His Real-time computing research integrates issues from Collision, Feature extraction and Physical layer. Yingying Chen has researched Authentication in several fields, including Password, Mobile computing, Login and Biometrics. His Wearable computer study integrates concerns from other disciplines, such as Voice command device and Direct voice input.
The scientist’s investigation covers issues in Speech recognition, Adversarial system, Adversary, Speaker recognition and Biometrics. His biological study spans a wide range of topics, including Fingerprint, Deep learning, Artificial intelligence and Vulnerability. The study incorporates disciplines such as Exploit and Speedup in addition to Adversarial system.
His Biometrics research is multidisciplinary, relying on both Vibration, User authentication, Authentication, Access control and Signal. His work carried out in the field of Authentication brings together such families of science as Data mining, Login, Classifier, User experience design and Mobile device. He merges Mobile device with Transaction processing in his study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures
Yan Wang;Jian Liu;Yingying Chen;Marco Gruteser.
acm/ieee international conference on mobile computing and networking (2014)
E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures
Yan Wang;Jian Liu;Yingying Chen;Marco Gruteser.
acm/ieee international conference on mobile computing and networking (2014)
Detecting and Localizing Wireless Spoofing Attacks
Yingying Chen;W. Trappe;R.P. Martin.
sensor mesh and ad hoc communications and networks (2007)
Detecting and Localizing Wireless Spoofing Attacks
Yingying Chen;W. Trappe;R.P. Martin.
sensor mesh and ad hoc communications and networks (2007)
Push the limit of WiFi based localization for smartphones
Hongbo Liu;Yu Gan;Jie Yang;Simon Sidhom.
acm/ieee international conference on mobile computing and networking (2012)
Push the limit of WiFi based localization for smartphones
Hongbo Liu;Yu Gan;Jie Yang;Simon Sidhom.
acm/ieee international conference on mobile computing and networking (2012)
Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi
Jian Liu;Yan Wang;Yingying Chen;Jie Yang.
mobile ad hoc networking and computing (2015)
Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi
Jian Liu;Yan Wang;Yingying Chen;Jie Yang.
mobile ad hoc networking and computing (2015)
Vivisecting YouTube: An active measurement study
Vijay Kumar Adhikari;Sourabh Jain;Yingying Chen;Zhi-Li Zhang.
international conference on computer communications (2012)
A first look at inter-data center traffic characteristics via Yahoo! datasets
Yingying Chen;Sourabh Jain;Vijay Kumar Adhikari;Zhi-Li Zhang.
international conference on computer communications (2011)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Florida State University
Rutgers, The State University of New Jersey
Rutgers, The State University of New Jersey
Rutgers, The State University of New Jersey
Lehigh University
Zhejiang Normal University
Zhejiang University
Shanghai Jiao Tong University
University of New South Wales
University of Sydney
Hebrew University of Jerusalem
University of Maine
Council of Scientific and Industrial Research
Technical University of Munich
Catholic University of America
Lawrence Livermore National Laboratory
Hebrew University of Jerusalem
Advanced Cell Technology (United States)
Utrecht University
Alfred Wegener Institute for Polar and Marine Research
National Taiwan Ocean University
National Center for Atmospheric Research
University of California, Los Angeles
University of Washington
University of Virginia
Harvard University