Loading [MathJax]/extensions/MathMenu.js
Xiang Yu - IEEE Xplore Author Profile

Showing 1-25 of 105 results

Filter Results

Show

Results

LoRa is a promising technology that provides widespread low-power IoT connectivity. With its capabilities for multi-channel communication, orthogonal transmission, and spectrum sharing, LoRaWAN is poised to connect millions of IoT devices across thousands of logical channels. However, current LoRa gateways rely on hardwired Rx chains that cover less than 1% of these channels, restricting the poten...Show More
Acoustic sensing for heartbeat monitoring has emerged as a prevailing research topic in wireless sensing. However, existing acoustic sensing systems face two limitations: a restricted sensing range and operation limited to a single user, impeding large-scale deployment of its applications. In this paper, we present DF-Sense, a Dual Forming based multi-user acoustic Sensing system for heartbeat mon...Show More
Spectrum competition and hardware complexity inherent in communication and radar systems can be alleviated by a dual-function radar communication (DFRC) systems. However, enhancing detection capabilities for maneuvering or weak targets remains a significant challenge, as traditional radar signal accumulation algorithms are not directly applicable to DFRC systems. This article proposes a novel meth...Show More
Federated Learning (FL) achieves great popularity in the Internet of Things (IoT) as a powerful interface to offer intelligent services to customers while maintaining data privacy. Under the orchestration of a server, edge devices (also called clients in FL) collaboratively train a global deep-learning model without sharing any local data. Nevertheless, the unequal training contributions among cli...Show More
Sensing in Integrated Sensing and Communications (ISAC) systems with clock asynchronism between the transmitter and receiver poses significant challenges. Understanding the fundamental limits of sensing performance in such setups, which remain largely unknown, is crucial. This paper investigates the sensing performance bounds in the presence of clock asynchronism. In both single-carrier and multi-...Show More
Wireless signal analytics in IoT systems can enable various promising wireless sensing applications such as localization, anomaly detection, and human activity recognition. As a matter of fact, there are significant correlations in terms of dimension, spatial and temporal aspects among wireless signals from multiple sensors. However, none of the wireless sensing research currently in use directly ...Show More
Recent research has been exploring ways to streamline device pairing by introducing touch-to-access that minimizes user interaction. It generates pairing keys by extracting features from a shared information source to ascertain if two devices are being held by the same person. While these solutions focus on verifying the authenticity of the device, they do not consider the legitimacy and pairing i...Show More
This paper presents the design and implementation of HyLink which aims to fill the gap between limited link capacity of LoRa and the diverse bandwidth requirements of IoT systems. At the heart of HyLink is a novel technique named parallel Chirp Spread Spectrum modulation, which tunes the number of modulated symbols to adapt bit-rates according to channel conditions. Over strong link connections, H...Show More
A wide range of scenarios, such as warehousing, and smart manufacturing, have used RFID mobile robots for the localization of tagged objects. The state-of-the-art RFID-robot based localization works are based on the premise of stable speed. However, in reality this assumption can hardly be guaranteed because Commercial-Off-The-Shelf (COTS) robots typically have inconsistent moving speeds, and a sm...Show More
LoRa has become a promising low-power wide-area network (LPWAN) technology for long-range communications, enabling various Internet of Things (IoT) applications. However, LoRa requires appropriate settings of transmission parameters on end devices (EDs) to achieve good performance for different IoT applications. We investigate in this paper power-efficient transmissions in LoRa uplink systems. To ...Show More
Fine-grained recognition of human manipulation activities on objects is crucial in the era of human-computer-object integration. However, there is a lack of solutions for simultaneous recognition of human identity, manipulation activities (including drawing and rotation), and manipulated objects. Therefore, we propose an RF-Camera system that combines RFID and computer vision techniques to address...Show More
User authentication is crucial for maintaining privacy. However, most existing methods are designed for single-user scenarios and may not be efficient for multiple users. To address this issue, we propose M-Auth, a ${M}$ ultiuser Auth entication system that utilizes a commercial mmWave radar to detect the unique breathing pattern. We exploit the phenomenon that chest movements due to breathing ca...Show More
Contactless respiration monitoring using wireless signals has drawn much attention in recent years. Many approaches have been proposed, however, they may not work when there is a lack of signals directly reflected from target's chest, e.g., a target faces away from the transceiver or a target is blocked by furniture. In this paper, we design and implement a novel omnimonitoring system for human re...Show More
In recent years, we have seen efforts made to monitor respiration for multiple users. Existing approaches capture chest movement relying on signals directly reflected from chest or separate breath waves based on breath rate difference between subjects. However, several limitations exist: 1) they may fail when subjects face away from the transceiver or are blocked by obstacles or other subjects; 2)...Show More
Nowadays, to realize the intelligent manufacturing in Industrial Internet of Things (IIoT) scenarios, novel approaches in computer vision are in great demand to tackle the new challenges in IIoT environment. These approaches, which we call Industrial Vision, are expected to offer customized solutions for intelligent manufacturing in an accurate, time efficient and robust manner. In this paper, we ...Show More
With the rapid development of 5G technologies, the demand of quality of service (QoS) from edge users, including high bandwidth and low latency, has increased dramatically. QoS within a mobile edge network is highly dependent on the allocation of edge users. However, the complexity of user movement greatly challenges edge user allocation, leading to privacy leakage. In addition, updating massive d...Show More
Physical-layer key generation is promising in establishing a pair of cryptographic keys for emerging LoRa networks. However, existing key generation systems may perform poorly since the channel reciprocity is critically impaired due to low data rate and long range in LoRa networks. To bridge this gap, this paper proposes a novel key generation system for LoRa networks, named ChirpKey. We reveal th...Show More
This letter exploits reconfigurable intelligent surface (RIS) in the heterogeneous networks (HetNets) with wireless backhaul to improve the task computing energy efficiency. To minimize the overall energy consumption of all users, we formulate the problem as a combinatorial optimization problem by jointly optimizing the transmit power of users and small cell base stations, computational capacity o...Show More
Mobile edge computing (MEC), as a key technology that facilitates 5G networks, provides a new and prospective mobile computing paradigm that allows the deployment of edge servers at base stations geographically close to mobile users to reduce their end-to-end network latency. Similar to cloud servers, edge servers running 24/7 in an MEC system consume a large amount of energy, contribute a signifi...Show More
User authentication is critical to privacy preservation. Most of the existing works focus on single-user authentication, which may not work efficiently and practically in multi-user scenarios. To this end, we present a Multi-user Authentication system (M-Auth) that employs a single COTS mmWave radar to capture the user's unique breathing pattern. It exploits the phenomenon that radio frequency (RF...Show More
Continuous authentication is crucial for protecting user’s privacy throughout their login session. Existing studies employ wireless sensing technologies to provide device-free and unobtrusive authentication; the user’s behavior is continually assessed without their direct involvement until it deviates from their normal pattern. However, these works primarily concentrate on single-user authenticati...Show More
Irradiated Cross-linked Polyethylene Foam (IXPE) has been one of the most commonly used materials in industry. During the production process of IXPE sheets, their edges need keep aligned strictly, otherwise, they could quickly get out of the border of the rolling plate and cause the huge economic loss. In this paper, we propose a camera-enabled approach, called Edge-Eye, to rectify the edge deviat...Show More
Voice assistant has been widely used for human-computer interaction and automatic meeting minutes. However, for multiple sound sources, the performance of speech recognition in voice assistant decreases dramatically. Therefore, it is crucial to separate multiple voices efficiently for an effective voice assistant application in multi-user scenarios. In this paper, we present a novel voice separati...Show More
Personal mobile sensing is fast permeating our daily lives to enable activity monitoring, healthcare and rehabilitation. Combined with deep learning, these applications have achieved significant success in recent years. Different from conventional cloud-based paradigms, running deep learning on devices offers several advantages including data privacy preservation and low-latency response for both ...Show More
Inattentive driving is one of the high-risk factors that causes a large number of traffic accidents every year. In this article, we aim to detect driver inattention leveraging on large-scale vehicle trajectory data while at the same time explore how do these inattentive events affect driver behaviors and what following reactions they may cause, especially, for commercial vehicles. Specifically, th...Show More