- Jul. 2021, I will be teaching CS1501 (Introduction to C++ Programming), more documents will be released soon. Stay tuned!
- Jul. 2021, I will be serving in the TPC for MobiCom 2022.
- May 2021, Our magnetic tracking paper got accepted by MobiCom 2021! Congratulations to the team!
- Jan. 2021, One paper on authenticating drivers using batteries is accepted by ACM UbiComp.
- Sept. 2020, I will serve as a publicity chair of MobiHoc 2021. The CFP will be out soon. Stay tuned!
- Dec. 2019, I defended my Ph.D. thesis!
Thesis Works at a Glance
Much of my thesis work focuses on empowering the next-generation transportation ecosystem that is comprised of vehicles, environment, and humans. My research includes a suite of novel and scalable sensing technologies for facilitating safer and more efficient transportation that has a profound impact on people. The synergy of my thesis works is illustrated in the corresponding figure. My research investigated ubiquitous sensing, vehicular system, and wireless communication. These three elements are cornerstones for tackling real-world challenges on our roads.
CyPhy Research Team
At SJTU, I lead CyPhy (cyber-physical) research team, focus on tackling real-world problems by employing systematic approaches, e.g., mobile computing, ubiquitous sensing, and RF engineering. Exemplary usage scenarios fall in smart transportation and at-home healthcare. I am fortunate to work with the following talents. Their motivation and curiosity to explore the unknown are the eternal driving forces of our team.
MagX: Wearable, Untethered Hands Tracking with Passive MagnetsMobiCom 2021
We proposed MagX, the first untethered and mobile magnetic tracking platform for fine-grained hand tracking. Exemplary applications includes AR/VR interaction and face-touching detection.
Authenticating Drivers Using Automotive BatteriesUbiComp 2021
This work presented B-Auth, a vehicle battery-based driver authentication platform. We discovered the connection between battery voltage with the driver's behavior, e.g., braking, acceleration, using wipers, etc.Paper
LibreCAN: Automated CAN Message TranslatorCCS 2019
LibreCAN can be used for automated translation of in-vehicle data, thus making the data flow in cars "transparent" to developers. In the future, we may be able to build apps on cars as easy as developing apps on smartphones!Paper | Website
TurnsMap: Enhancing Traffic Safety with Crowdsensing and Deep LearningUbiComp 2019
This work presents TurnsMap, an IoT + AI framework for automatically detecting if a left turn is safe, e.g., whether it has protection for left-turning cars. Democratizing this information can help assure traffic safety for various transportation applications, e.g., navigation and ride-sharing apps.Paper | Website | Slides
Mobile IMUs Reveal Driver's Identity from Vehicle TurnsArXiv Preprint, 2017
This work presents Dri-Fi, a solution that enables automotive apps to identify the person behind-the-wheel by only using mobile sensors. The capability of identifying driver is essential for personalized service/assistance for the driver and his/her designated parties, thus can benefit various automotive appsPaper
Locating and Tracking BLE Beacons with SmartphonesCoNEXT, 2017
LocBLE is able to locate specific location of any surrounding Bluetooth low energy (BLE) beacons by justing using your smartphone. Comparing to existing coarse-grained BLE ranging applications, LocBLE is capable of enabling various use cases in Internet-of-Things. This is a collaborative work with Hewlett Packard Labs during my internship.Paper | Demo | Slides
Invisible Sensing of Vehicle Steering with SmartphonesMobiSys, 2015
This work introduced a vehicle steering detection middleware called V-Sense which can run on commodity smartphones without additional sensors or infrastructure support.Paper | Demo | Slides
Vulnerability and Protection of Channel State Information in Multiuser MIMO NetworksCCS, 2014
This work investigated vulnerability in MU-MIMO. Focus on plaintext feedback of estimated channel state information (CSI) from clients to the APs. We have found a malicious user could use sniff attack power attack by utilizing the vulnerability in existing CSI feed scheme.Paper