Publications
2020
ACM IMWUT '20 & UbiComp '20 |
Leveraging Polarization of WiFi Signals to Simultaneously Track Multiple People |
IPSN '20 |
RFMap: Generating Indoor Maps using RF Signals |
ICDCS '20 |
Characterizing the Impact of TCP Coexistence in Data Center Networks |
PICom '20 |
Recognizing Human Gestures Using Ambient Light |
MASS '20 |
Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion |
MASS '20 |
A WiFi-based Home Security System |
ICCCN '20 |
Choosing TCP Variants for Cloud Tenants – A Measurement based Approach |
IEEE TPDS '20 |
SF-sketch: A Two-stage Sketch for Data Streams |
IEEE TPDS '20 |
SF-sketch: A Two-stage Sketch for Data Streams |
Elsevier CMPB '20 |
Bimodal Affect Recognition based on Autoregressive Hidden Markov Models from Physiological Signals |
IFIP Networking '20 |
Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion (Extended Abstract) |
2019
IEEE TMC '19 |
WiFi based Multi-User Gesture Recognition |
ACM IMWUT '19 & UbiComp '19 |
Enhancing Indoor Inertial Odometry with WiFi |
IEEE TDSC '19 |
Large Scale Characterization of Software Vulnerability Life Cycles |
ICCCN '19 |
Characterizing the Performance of WiFi in Dense IoT Deployments |
ICNP '19 |
Demo: Measuring Distance Traveled by an Object using WiFi-CSI and IMU Fusion |
IFIP Networking '19 |
A Framework to Secure IoT Networks Against Network Layer Attacks (Extended Abstract) |
IFIP Networking '19 |
Characterizing the Performance of WiFi in Dense IoT Deployments (Extended Abstract) |
ComNet-IoT '19 |
CSlim: Automated Extraction of IoT Functionalities from Legacy C Codebases |
2018
ACM IMWUT '18 & UbiComp '18 |
Augmenting User Identification with WiFi Based Gesture Recognition |
ACM IMWUT '18 & UbiComp '18 |
Gesture Recognition Using Ambient Light |
MobiSys '18 |
Multi-User Activity Recognition Using WiFi |
ICNP '18 |
IoTm: A Lightweight Framework for Fine-grained Measurements of IoT Performance Metrics |
IEEE/ACM ToN '18 |
Identifying and Estimating Persistent Items in Data Streams |
WWW Journal '18 |
FID-Sketch: an Accurate Sketch to Store Frequencies in Data Streams |
ICC '18 |
Towards Composing Access Control Policies |
EdgeSys '18 |
Sizing Buffers of IoT Edge Routers |
Mobile IoT SSP '18 |
Impacts and Detection of Network Layer Attacks on IoT Networks |
NetAI '18 |
Empowering Sketches with Machine Learning for Network Measurements |
ACM S3 '18 |
Recognizing Gestures With Ambient Light |
2017
MobiSys '17 |
Position and Orientation Agnostic Gesture Recognition Using WiFi |
BigData '17 |
Rectangular Hash Table: Bloom Filter and Bitmap Assisted Hash Table with High Speed |
IEEE IC '17 |
Continuous Authentication and Authorization for the Internet of Things (invited; not peer-reviewed) |
ICDE '17 |
SF-sketch: A Fast, Accurate, and Memory Efficient Data Structure to Store Frequencies of Data Items (Extended Abstract) |
IEEE/ACM ToN '17 |
A Shifting Framework for Set Queries |
IEEE JSAC '17 |
Device-free Human Activity Recognition Using Commercial WiFi Devices |
IEEE JSAC '17 |
Recognizing Keystrokes Using WiFi Devices |
VLDB '17 |
Finding Persistent Items in Data Streams |
ICDCS '17 |
Fast and Accurate Tracking of Population Dynamics in RFID Systems |
2016
IEEE TMC '16 |
Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures |
IEEE/ACM ToN '16 |
Multi-category RFID Estimation |
IEEE/ACM ToN '16 |
Fast and Reliable Detection and Identification of Missing RFID Tags in the Wild |
IEEE/ACM ToN '16 |
Accurate and Efficient Per-flow Latency Measurement without Probing and Time Stamping |
UbiComp '16 |
Gait Recognition Using WiFi Signals |
IFIP Networking '16 |
A Stochastic Frame Based Approach to RFID Tag Searching |
VLDB '16 |
A Shifting Bloom Filter Framework for Set Queries |
2015
ICNP '15 |
Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness |
MobiCom '15 |
Understanding and Modeling of WiFi Signal Based Human Activity Recognition |
MobiCom '15 |
Keystroke Recognition Using WiFi Signals |
INFOCOM '15 |
Expecting the Unexpected: Fast and Reliable Detection of Missing RFID Tags in the Wild |