
Xiaoyu Ji
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j36]Jiayu Zhang, Zhiyun Wang, Xiaoyu Ji, Wenyuan Xu, Gang Qu, Minjian Zhao:
Who is Charging My Phone? Identifying Wireless Chargers via Fingerprinting. IEEE Internet Things J. 8(4): 2992-2999 (2021) - 2020
- [j35]Jiayi Yang, Xiaoyu Ji, Wenxiang Quan, Yunshan Liu, Bowen Wei, Tongning Wu:
Classification of Schizophrenia by Functional Connectivity Strength Using Functional Near Infrared Spectroscopy. Frontiers Neuroinformatics 14: 40 (2020) - [j34]Guoming Zhang
, Xiaoyu Ji, Yanjie Li, Wenyuan Xu:
Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid. Sensors 20(13): 3635 (2020) - [j33]Xiaoyu Ji, Chaohao Li, Xinyan Zhou, Juchuan Zhang, Yanmiao Zhang, Wenyuan Xu:
Authenticating Smart Home Devices via Home Limited Channels. ACM Trans. Internet Things 1(4): 24:1-24:24 (2020) - [j32]Yushi Cheng
, Xiaoyu Ji
, Tianyang Lu, Wenyuan Xu:
On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach. IEEE Trans. Mob. Comput. 19(4): 907-921 (2020) - [j31]Xiaoyu Ji, Xinyan Zhou, Miao Xu, Wenyuan Xu, Yabo Dong:
OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration. ACM Trans. Sens. Networks 16(2): 16:1-16:28 (2020) - [j30]Yushi Cheng, Xiaoyu Ji, Xiaopeng Li, Tianchen Zhang, Sharaf Malebary
, Xianshan Qu, Wenyuan Xu:
Identifying Child Users via Touchscreen Interactions. ACM Trans. Sens. Networks 16(4): 35:1-35:25 (2020) - [c38]Lanqing Yang, Honglu Li, Zhaoxi Chen, Xiaoyu Ji, Yi-Chao Chen, Guangtao Xue, Chuang-Wen You:
Appliance fingerprinting using sound from power supply. UbiComp/ISWC Adjunct 2020: 160-163 - [c37]Juchuan Zhang, Xiaoyu Ji, Wenyuan Xu, Yi-Chao Chen, Yuting Tang, Gang Qu:
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding. INFOCOM 2020: 357-366 - [c36]Yijie Li, Yi-Chao Chen, Xiaoyu Ji, Hao Pan, Lanqing Yang, Guangtao Xue, Jiadi Yu:
Toward a secure QR code system by fingerprinting screens. MobiCom 2020: 86:1-86:3 - [i3]Zhiyun Wang, Jiayu Zhang, Xiaoyu Ji, Wenyuan Xu, Gang Qu, Min-Jian Zhao:
Who Is Charging My Phone? Identifying Wireless Chargers via Fingerprinting. CoRR abs/2007.15348 (2020)
2010 – 2019
- 2019
- [j29]Yajing Tan, Xiaoyu Ji, Sen Yan:
New models of supply chain network design by different decision criteria under hybrid uncertainties. J. Ambient Intell. Humaniz. Comput. 10(7): 2843-2853 (2019) - [j28]Taimin Zhang, Xiaoyu Ji, Zhou Zhuang, Wenyuan Xu:
JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid. Sensors 19(4): 909 (2019) - [j27]Daibo Liu, Zhichao Cao, Yuan He, Xiaoyu Ji, Mengshu Hou, Hongbo Jiang:
Exploiting Concurrency for Opportunistic Forwarding in Duty-Cycled IoT Networks. ACM Trans. Sens. Networks 15(3): 31:1-31:33 (2019) - [c35]Yushi Cheng, Xiaoyu Ji, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu:
MagAttack: Guessing Application Launching and Operation via Smartphone. AsiaCCS 2019: 283-294 - [c34]Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen:
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. CCS 2019: 1149-1170 - [c33]Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu:
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification. CCS 2019: 1215-1229 - [c32]Xiaoyu Ji, Qiming Yu, Yunxia Liu, Shan Kong:
A Recognition Method for Italian Alphabet Gestures Based on Convolutional Neural Network. ICIC (1) 2019: 653-664 - [c31]Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu:
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity. INFOCOM 2019: 2080-2088 - [c30]Hao Pan, Yi-Chao Chen, Lanqing Yang, Guangtao Xue, Chuang-Wen You, Xiaoyu Ji:
mQRCode: Secure QR Code Using Nonlinearity of Spatial Frequency in Light. MobiCom 2019: 27:1-27:18 - [c29]Hao Pan, Lanqing Yang, Yi-Chao Chen, Guangtao Xue, Chuang-Wen You, Xiaoyu Ji, Pai-Yen Chen:
Poster: Secure Visible Light Communication based on Nonlinearity of Spatial Frequency in Light. MobiCom 2019: 93:1-93:3 - [c28]Guoming Zhang, Xiaoyu Ji, Xinyan Zhou, Dong-lian Qi, Wenyuan Xu:
UltraComm: High-Speed and Inaudible Acoustic Communication. QSHINE 2019: 184-204 - [c27]Taimin Zhang, Xiaoyu Ji, Wenyuan Xu:
AHV-RPL: Jamming-Resilient Backup Nodes Selection for RPL-Based Routing in Smart Grid AMI Networks. QSHINE 2019: 235-251 - 2018
- [j26]Wenyuan Xu, Chen Yan
, Weibin Jia, Xiaoyu Ji
, Jianhao Liu:
Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles. IEEE Internet Things J. 5(6): 5015-5029 (2018) - [j25]Xiaoyu Ji
, Yushi Cheng, Wenyuan Xu
, Xinyan Zhou:
User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes. Secur. Commun. Networks 2018: 3980371:1-3980371:10 (2018) - [j24]Xinyan Zhou
, Xiaoyu Ji, Yi-Chao Chen, Xiaopeng Li
, Wenyuan Xu:
LESS: Link Estimation with Sparse Sampling in Intertidal WSNs. Sensors 18(3): 747 (2018) - [j23]Xinyan Zhou
, Xiaoyu Ji, Bin Wang, Yushi Cheng, Zhuoran Ma, Francis Choi
, Brian Helmuth
, Wenyuan Xu:
Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks. Sensors 18(5): 1464 (2018) - [j22]Sen Yan, Xiaoyu Ji:
Portfolio selection model of oil projects under uncertain environment. Soft Comput. 22(17): 5725-5734 (2018) - [j21]Xiaoyu Ji
, Jian Zhou
:
Solving High-Order Uncertain Differential Equations via Runge-Kutta Method. IEEE Trans. Fuzzy Syst. 26(3): 1379-1386 (2018) - [j20]Wei Gong
, Haoxiang Liu, Jiangchuan Liu
, Xiaoyi Fan
, Kebin Liu, Qiang Ma, Xiaoyu Ji:
Channel-Aware Rate Adaptation for Backscatter Networks. IEEE/ACM Trans. Netw. 26(2): 751-764 (2018) - [c26]Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu:
DeWiCam: Detecting Hidden Wireless Cameras via Smartphones. AsiaCCS 2018: 1-13 - [c25]Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu:
HlcAuth: Key-free and Secure Communications via Home-Limited Channel. AsiaCCS 2018: 29-35 - [c24]Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu:
FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting. AsiaCCS 2018: 261-272 - [c23]Hao Pan, Yi-Chao Chen, Guangtao Xue, Chuang-Wen You, Xiaoyu Ji:
Secure QR Code Scheme Using Nonlinearity of Spatial Frequency. UbiComp/ISWC Adjunct 2018: 207-210 - [c22]Xiaopeng Li
, Sharaf Malebary
, Xianshan Qu, Xiaoyu Ji, Yushi Cheng, Wenyuan Xu:
iCare: Automatic and User-friendly Child Identification on Smartphones. HotMobile 2018: 43-48 - [i2]Wenyuan Xu, Xiaopeng Li
, Jing Tian, Yujun Xiao, Xianshan Qu, Song Wang, Xiaoyu Ji:
Which One to Go: Security and Usability Evaluation of Mid-Air Gestures. CoRR abs/1811.10168 (2018) - 2017
- [j19]Jumin Zhao, Biaokai Zhu, Xiaoyu Ji, XuFei Mao, Deng-Ao Li, Qingming Tang:
Up Torrent: An Efficient Data Collection Protocol in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 35(3-4): 261-280 (2017) - [j18]Xiaoyu Ji, Hua Ke
:
No-arbitrage theorem for multi-factor uncertain stock model with floating interest rate. Fuzzy Optim. Decis. Mak. 16(2): 221-234 (2017) - [j17]Xiaoyu Ji, Sen Yan, Siyu Feng:
Uncertain multi-objective optimal model of oilfield development planning and its algorithm. J. Ambient Intell. Humaniz. Comput. 8(5): 769-779 (2017) - [j16]Xiaoyu Ji, Kai Yao:
Uncertain project scheduling problem with resource constraints. J. Intell. Manuf. 28(3): 575-580 (2017) - [j15]Yaodong Ni, Liu Ning, Hua Ke, Xiaoyu Ji:
Modeling and minimizing information distortion in information diffusion through a social network. Soft Comput. 21(18): 5281-5293 (2017) - [j14]Xiaoyu Ji, Huishan Wu:
A currency exchange rate model with jumps in uncertain environment. Soft Comput. 21(18): 5507-5514 (2017) - [j13]Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Daibo Liu, Ke Yi, Yunhao Liu:
On Improving Wireless Channel Utilization: A Collision Tolerance-Based Approach. IEEE Trans. Mob. Comput. 16(3): 787-800 (2017) - [c21]Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu:
DolphinAttack: Inaudible Voice Commands. CCS 2017: 103-117 - [c20]Yushi Cheng, Xiaoyu Ji, Xinyan Zhou, Wenyuan Xu:
HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera. ICPADS 2017: 779-782 - [c19]Hao Pan, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji:
MagneComm: Magnetometer-based Near-Field Communication. MobiCom 2017: 167-179 - [c18]Xiaohan Lai
, Miao Xu, Xiaoyu Ji, Wenyuan Xu, Longdao Chen:
En-MAC: Environment-aware MAC protocol for WSNs in intertidal environment. WCSP 2017: 1-6 - [c17]Zhuoran Ma, Xinyan Zhou, Xuan Ouyang, Xiaoyu Ji, Wenyuan Xu:
A robust backup routing protocol for neighbor area network in the smart grid. WCSP 2017: 1-6 - [c16]Xinyan Zhou, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
SADO: State-associated and delay-oriented data collection for intertidal WSNs. WCSP 2017: 1-6 - [i1]Guoming Zhang, Chen Yan, Xiaoyu Ji, Taimin Zhang, Tianchen Zhang, Wenyuan Xu:
DolphinAtack: Inaudible Voice Commands. CoRR abs/1708.09537 (2017) - 2016
- [j12]Xiaoyu Ji, Hua Ke
:
Almost sure stability for uncertain differential equation with jumps. Soft Comput. 20(2): 547-553 (2016) - [j11]Xi Chen, Xiaopei Wu, Xiang-Yang Li, Xiaoyu Ji, Yuan He, Yunhao Liu:
Privacy-Aware High-Quality Map Generation with Participatory Sensing. IEEE Trans. Mob. Comput. 15(3): 719-732 (2016) - [j10]Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, Yunhao Liu:
Hitchhike: A Preamble-Based Control Plane for SNR-Sensitive Wireless Networks. IEEE Trans. Wirel. Commun. 15(2): 1239-1251 (2016) - [c15]Zhuangdi Zhu, Hao Pan, Yi-Chao Chen, Xiaoyu Ji, Fan Zhang, Chuang-Wen You:
MagAttack: remote app sensing with your phone. UbiComp Adjunct 2016: 241-244 - [c14]Guoning Lv, Min Gao, Xiaoyu Ji:
Research on Information Security of Electronic Commerce Logistics System. ICIC (1) 2016: 600-611 - [c13]Yi Zhang
, Jiliang Wang, Yuan He, Xiaoyu Ji, Yanrong Kang, Daibo Liu, Bo Li:
Furion: Towards Energy-Efficient WiFi Offloading under Link Dynamics. SECON 2016: 1-9 - 2015
- [j9]Xiaoyu Ji, Jian Zhou:
Multi-dimensional uncertain differential equation: existence and uniqueness of solution. Fuzzy Optim. Decis. Mak. 14(4): 477-491 (2015) - [j8]Xiaoyu Ji, Jian Zhou:
Option pricing for an uncertain stock model with jumps. Soft Comput. 19(11): 3323-3329 (2015) - [c12]Daibo Liu, Zhichao Cao, Xiaopei Wu, Yuan He, Xiaoyu Ji, Mengshu Hou:
Tele Adjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs. ICDCS 2015: 716-725 - [c11]Daibo Liu, Mengshu Hou, Zhichao Cao, Yuan He, Xiaoyu Ji, Xiaolong Zheng:
COF: Exploiting Concurrency for Low Power Opportunistic Forwarding. ICNP 2015: 32-42 - 2014
- [j7]Kai Yao, Xiaoyu Ji:
Uncertain Decision Making and its Application to portfolio Selection Problem. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 22(1): 113-124 (2014) - [c10]Wenzhong Liang, Guangquan Lu, Xiaoyu Ji, Jian Li, Dingrong Yuan:
Difference Factor' KNN Collaborative Filtering Recommendation Algorithm. ADMA 2014: 175-184 - [c9]Xiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu, Yunhao Liu:
Walking down the STAIRS: Efficient collision resolution for wireless sensor networks. INFOCOM 2014: 961-969 - [c8]Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, Yunhao Liu:
Hitchhike: Riding control on preambles. INFOCOM 2014: 2499-2507 - [c7]Weixi Gu, Zheng Yang, Longfei Shangguan, Xiaoyu Ji, Yiyang Zhao:
ToAuth: Towards Automatic Near Field Authentication for Smartphones. TrustCom 2014: 229-236 - 2013
- [c6]Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Ke Yi, Yunhao Liu:
Voice over the dins: Improving wireless channel utilization with collision tolerance. ICNP 2013: 1-10 - 2010
- [j6]Zhongfeng Qin, Xiaoyu Ji:
Logistics network design for product recovery in fuzzy environment. Eur. J. Oper. Res. 202(2): 479-490 (2010) - [c5]Lining Yao, Yan Shi, Hengfeng Chi, Xiaoyu Ji, Fangtian Ying:
Music-touch shoes: vibrotactile interface for hearing impaired dancers. Tangible and Embedded Interaction 2010: 275-276
2000 – 2009
- 2009
- [c4]Lixing Yang, Xiaoyu Ji:
Some Properties of Expected Value Operators of Fuzzy Variables and Fuzzy Random Variables. FSKD (6) 2009: 423-427 - [c3]Xi Chen, Xiaoyu Ji:
Fuzzy Goal Programming Model and Algorithm for Oilfield Development. ICFIE 2009: 1343-1353 - 2007
- [j5]Xiaoyu Ji, Xiande Zhao, Deming Zhou:
A Fuzzy Programming Approach for Supply Chain Network Design. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 15(Supplement-2): 75-87 (2007) - 2006
- [j4]Xiaoyu Ji, Zhen Shao:
Model and algorithm for bilevel newsboy problem with fuzzy demands and discounts. Appl. Math. Comput. 172(1): 163-174 (2006) - [j3]Zhen Shao, Xiaoyu Ji:
Fuzzy multi-product constraint newsboy problem. Appl. Math. Comput. 180(1): 7-15 (2006) - [j2]Yuanguo Zhu, Xiaoyu Ji:
Expected values of functions of fuzzy variables. J. Intell. Fuzzy Syst. 17(5): 471-478 (2006) - [c2]Xiaoyu Ji, Lixing Yang, Zhen Shao:
Chance Constrained Maximum Flow Problem with Fuzzy Arc Capacities. ICIC (2) 2006: 11-19 - 2005
- [j1]Xiaoyu Ji:
Models and algorithm for stochastic shortest path problem. Appl. Math. Comput. 170(1): 503-514 (2005) - [c1]Jinwu Gao, Jianhua Zhao, Xiaoyu Ji:
Fuzzy Chance-Constrained Programming for Capital Budgeting Problem with Fuzzy Decisions. FSKD (1) 2005: 304-311
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-27 23:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint