SlideShare a Scribd company logo
1 of 2
Download to read offline
Publication List
Referred Journals and Magazine Papers:
 Yan Wang, Yingying Chen, Jie Yang, Luyang Liu, Marco Gruteser, Richard P. Martin, Hongbo Liu, "
Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors," IEEE Transactions on
Mobile Computing (IEEE TMC), 2014 (In-submission)
 Yan Wang, Mooi Choo Chuah and Yingying Chen, "Incentive Based Data Sharing in Delay Tolerant
Mobile Networks," IEEE Transactions on Wireless Communications (IEEE TWC), Volume.3, No.1,
Pages.370-381, 2014
 Yan Wang, Yingying Chen, and Richard P. Martin, "Leveraging Wi-Fi Signals to Monitor Human
Queues," IEEE Pervasive Computing Magazine, Volume 13, No. 2, Pages 14-17, April-June 2014
 Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, and C. Emre Koksal, "Group Secret Key Generation
via Received Signal Strength: Protocols, Achievable Rates, and Implementation", IEEE Transactions on
Mobile Computing (IEEE TMC), Volume 13, Issue 12, Pages 2820-2835, 2014
 Hongbo Liu, Jie Yang, Simon Sidhom, Yan Wang, Yingying Chen, Fan Ye, "Accurate WiFi Based
Localization for Smartphones Using Peer Assistance," in IEEE Transactions on Mobile Computing (IEEE
TMC), Volume 13, No.10, Pages 2199 - 2214, 2014
Referred Conference Papers:
 Yan Wang, Jian Liu, Yingying Chen, Marco Gruteser, Jie Yang, Hongbo Liu, "E-eyes: Device-free
Location-oriented Activity Identification Using Fine-grained WiFi Signatures," in Proceedings of the 20th
Annual International Conference on Mobile Computing and Networking (MobiCom 2014), Maui, Hawii,
Sept. 2014. (Acceptance rate: 36/220 = 16.4%)
 Yan Wang, Jie Yang, Yingying Chen, Hongbo Liu, Marco Gruteser, Richard P. Martin, "Tracking
Human Queues Using Single-Point Signal Monitoring," in Proceedings of the 12th International
Conference on Mobile Systems, Applications, and Services (MobiSys 2014), New Hampshire, USA, June
2014. (Acceptance rate: 25/185 = 13.5%)
 Gorkem Kar, Hossen Mustafa, Yan Wang, Yingying Chen, Wenyuan Xu, Marco Gruteser, Tam Vu,
"Detection of On-Road Vehicles Emanating GPS Interference," in Proceedings of the ACM Conference
on Computer and Communications Security (CCS 2014), Scottsdale, Arizona, Nov. 2014. (Acceptance
rate: 114/585 = 19.5%)
 Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen, "Practical User Authentication Leveraging
Channel State Information (CSI), " in Proceedings of the 9th ACM Symposium on Information, Computer
and Communications Security (ASIACCS 2014), Kyoto, Japan, June 2014.(Acceptance rate: 52/260 =
20%)
 Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, Richard P. Martin, "Sensing Vehicle
Dynamics for Determining Driver Phone Use," in Proceedings of the 11th International Conference on
Mobile Systems, Applications, and Services (MobiSys 2013), Taipei, Taiwan, June 2013. (Acceptance
rate: 33/210=15.7%)
 Hongbo Liu, Yan Wang, Jie Yang, Yingying Chen, "Fast and Practical Secret Key Extraction by
Exploiting Channel Response," in Proceedings of the IEEE International Conference on Computer
Communications (IEEE INFOCOM 2013), Turin, Italy, April 2013. (Acceptance rate: 17%)
 Hongbo Liu, Yu Gan, Jie Yang, Simon Sidhom, Yan Wang, Yingying Chen, Fan Ye, "Push the Limit of
WiFi based Localization for Smartphones," in Proceedings of the 18th Annual International Conference
on Mobile Computing and Networking (MobiCom 2012), Pages 305-316, Istanbul, Turkey, August 2012.
(Acceptance rate: 32/212 = 15%)
 Yan Wang, Mooi-Choo Chuah, Yingying Chen, "Incentive Driven Information Sharing in Delay
Tolerant Mobile Networks," in Proceedings of the IEEE Global Communications Conference 2012
Wireless Networking Symposium (IEEE Globecom), Anaheim, California, December 2012.
 Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, "Collaborative Secret Key Extraction Leveraging
Received Signal Strength in Mobile Wireless Networks," in Proceedings of the IEEE International
Conference on Computer Communications (IEEE INFOCOM 2012), Orlando, Florida USA, March
2012. (Acceptance rate: 18%)
Poster Papers:
 Yan Wang, Yingying Chen, Fan Ye, Jie Yang, Hongbo Liu, "A Study of Smartphone User Privacy from
the Advertiser's Perspective," 35th IEEE Symposium on Security and Privacy (IEEE S&P 2014), Poster
Session, San Jose, CA, May, 2014
 Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, Richard P. Martin, "Measuring
Human Queues Using WiFi Signals," in Proceedings of ACM Conference on Mobile Computing and
Networking (MobiCom2013), Pages 235-238, Poster Session, Miami, Florida, 2013. - Winner of
Student Research Competition

More Related Content

What's hot

Media in the entertainment business
Media in the entertainment businessMedia in the entertainment business
Media in the entertainment businessb1139427
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
 
Wireless in the Workplace - White Paper - FINAL Sanatized
Wireless in the Workplace - White Paper - FINAL SanatizedWireless in the Workplace - White Paper - FINAL Sanatized
Wireless in the Workplace - White Paper - FINAL SanatizedJack Voth
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsAnax Fotopoulos
 
Report: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesReport: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesIJCI JOURNAL
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 
Adma Mobile Marketing Course 2009 For Printing
Adma Mobile Marketing Course 2009 For PrintingAdma Mobile Marketing Course 2009 For Printing
Adma Mobile Marketing Course 2009 For PrintingRichard Pester
 
BASICS OF MOBILE COMPUTING
BASICS OF MOBILE COMPUTINGBASICS OF MOBILE COMPUTING
BASICS OF MOBILE COMPUTINGVENNILAV6
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesCSCJournals
 
Vibemedia: Mobile Internet and Connected Services
Vibemedia: Mobile Internet and Connected ServicesVibemedia: Mobile Internet and Connected Services
Vibemedia: Mobile Internet and Connected ServicesGareth Capon
 
Simon Forge TAFI workshop
Simon Forge TAFI workshopSimon Forge TAFI workshop
Simon Forge TAFI workshopblogzilla
 

What's hot (13)

Media in the entertainment business
Media in the entertainment businessMedia in the entertainment business
Media in the entertainment business
 
Session 3 Results
Session 3 ResultsSession 3 Results
Session 3 Results
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...
 
Wireless in the Workplace - White Paper - FINAL Sanatized
Wireless in the Workplace - White Paper - FINAL SanatizedWireless in the Workplace - White Paper - FINAL Sanatized
Wireless in the Workplace - White Paper - FINAL Sanatized
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
 
Report: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesReport: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using Smartphones
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Adma Mobile Marketing Course 2009 For Printing
Adma Mobile Marketing Course 2009 For PrintingAdma Mobile Marketing Course 2009 For Printing
Adma Mobile Marketing Course 2009 For Printing
 
BASICS OF MOBILE COMPUTING
BASICS OF MOBILE COMPUTINGBASICS OF MOBILE COMPUTING
BASICS OF MOBILE COMPUTING
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for Smartphones
 
Master Thesis Projects
Master Thesis ProjectsMaster Thesis Projects
Master Thesis Projects
 
Vibemedia: Mobile Internet and Connected Services
Vibemedia: Mobile Internet and Connected ServicesVibemedia: Mobile Internet and Connected Services
Vibemedia: Mobile Internet and Connected Services
 
Simon Forge TAFI workshop
Simon Forge TAFI workshopSimon Forge TAFI workshop
Simon Forge TAFI workshop
 

Similar to Publication List_Yan Wang

CV_CHEN, Yanjiao0807
CV_CHEN, Yanjiao0807CV_CHEN, Yanjiao0807
CV_CHEN, Yanjiao0807Jenny Chen
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
 
March 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information TechnologyMarch 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciIJCI JOURNAL
 
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1IJNSA Journal
 
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...IJNSA Journal
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...IJNSA Journal
 

Similar to Publication List_Yan Wang (20)

CV_CHEN, Yanjiao0807
CV_CHEN, Yanjiao0807CV_CHEN, Yanjiao0807
CV_CHEN, Yanjiao0807
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)
 
March 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information TechnologyMarch 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information Technology
 
Publication
PublicationPublication
Publication
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijci
 
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its Applications
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 

Publication List_Yan Wang

  • 1. Publication List Referred Journals and Magazine Papers:  Yan Wang, Yingying Chen, Jie Yang, Luyang Liu, Marco Gruteser, Richard P. Martin, Hongbo Liu, " Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors," IEEE Transactions on Mobile Computing (IEEE TMC), 2014 (In-submission)  Yan Wang, Mooi Choo Chuah and Yingying Chen, "Incentive Based Data Sharing in Delay Tolerant Mobile Networks," IEEE Transactions on Wireless Communications (IEEE TWC), Volume.3, No.1, Pages.370-381, 2014  Yan Wang, Yingying Chen, and Richard P. Martin, "Leveraging Wi-Fi Signals to Monitor Human Queues," IEEE Pervasive Computing Magazine, Volume 13, No. 2, Pages 14-17, April-June 2014  Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, and C. Emre Koksal, "Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation", IEEE Transactions on Mobile Computing (IEEE TMC), Volume 13, Issue 12, Pages 2820-2835, 2014  Hongbo Liu, Jie Yang, Simon Sidhom, Yan Wang, Yingying Chen, Fan Ye, "Accurate WiFi Based Localization for Smartphones Using Peer Assistance," in IEEE Transactions on Mobile Computing (IEEE TMC), Volume 13, No.10, Pages 2199 - 2214, 2014 Referred Conference Papers:  Yan Wang, Jian Liu, Yingying Chen, Marco Gruteser, Jie Yang, Hongbo Liu, "E-eyes: Device-free Location-oriented Activity Identification Using Fine-grained WiFi Signatures," in Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (MobiCom 2014), Maui, Hawii, Sept. 2014. (Acceptance rate: 36/220 = 16.4%)  Yan Wang, Jie Yang, Yingying Chen, Hongbo Liu, Marco Gruteser, Richard P. Martin, "Tracking Human Queues Using Single-Point Signal Monitoring," in Proceedings of the 12th International Conference on Mobile Systems, Applications, and Services (MobiSys 2014), New Hampshire, USA, June 2014. (Acceptance rate: 25/185 = 13.5%)  Gorkem Kar, Hossen Mustafa, Yan Wang, Yingying Chen, Wenyuan Xu, Marco Gruteser, Tam Vu, "Detection of On-Road Vehicles Emanating GPS Interference," in Proceedings of the ACM Conference on Computer and Communications Security (CCS 2014), Scottsdale, Arizona, Nov. 2014. (Acceptance rate: 114/585 = 19.5%)  Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen, "Practical User Authentication Leveraging Channel State Information (CSI), " in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, June 2014.(Acceptance rate: 52/260 = 20%)  Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, Richard P. Martin, "Sensing Vehicle Dynamics for Determining Driver Phone Use," in Proceedings of the 11th International Conference on Mobile Systems, Applications, and Services (MobiSys 2013), Taipei, Taiwan, June 2013. (Acceptance rate: 33/210=15.7%)  Hongbo Liu, Yan Wang, Jie Yang, Yingying Chen, "Fast and Practical Secret Key Extraction by Exploiting Channel Response," in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2013), Turin, Italy, April 2013. (Acceptance rate: 17%)  Hongbo Liu, Yu Gan, Jie Yang, Simon Sidhom, Yan Wang, Yingying Chen, Fan Ye, "Push the Limit of WiFi based Localization for Smartphones," in Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MobiCom 2012), Pages 305-316, Istanbul, Turkey, August 2012. (Acceptance rate: 32/212 = 15%)  Yan Wang, Mooi-Choo Chuah, Yingying Chen, "Incentive Driven Information Sharing in Delay Tolerant Mobile Networks," in Proceedings of the IEEE Global Communications Conference 2012 Wireless Networking Symposium (IEEE Globecom), Anaheim, California, December 2012.  Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, "Collaborative Secret Key Extraction Leveraging Received Signal Strength in Mobile Wireless Networks," in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2012), Orlando, Florida USA, March 2012. (Acceptance rate: 18%) Poster Papers:
  • 2.  Yan Wang, Yingying Chen, Fan Ye, Jie Yang, Hongbo Liu, "A Study of Smartphone User Privacy from the Advertiser's Perspective," 35th IEEE Symposium on Security and Privacy (IEEE S&P 2014), Poster Session, San Jose, CA, May, 2014  Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, Richard P. Martin, "Measuring Human Queues Using WiFi Signals," in Proceedings of ACM Conference on Mobile Computing and Networking (MobiCom2013), Pages 235-238, Poster Session, Miami, Florida, 2013. - Winner of Student Research Competition