Jiadi Yu
YOU?
Author Swipe
View article: All-textile, chip-less, battery-free body sensor networks enabled by a concentric multi-node hub antenna architecture
All-textile, chip-less, battery-free body sensor networks enabled by a concentric multi-node hub antenna architecture Open
Textile-based, chip-less, wireless body sensor networks (WBANs) offer continuous, wireless monitoring of physiological signals from passive sensors distributed across body locations, representing a promising solution for daily wearable sen…
View article: SADIF: Spoofing Attack on BLE Direction Finding Based Localization System
SADIF: Spoofing Attack on BLE Direction Finding Based Localization System Open
View article: OccMesh: Occlusion-aware Multi-user 3D Human Mesh Reconstruction Using mmWave Signals
OccMesh: Occlusion-aware Multi-user 3D Human Mesh Reconstruction Using mmWave Signals Open
Nowadays, 3D human mesh reconstruction technology has drawn great attention in the metaverse for building digital humans. As current mainstream solutions, vision-based systems suffer from privacy leakage and depend on lighting conditions. …
View article: EMTap: Eavesdropping on Sound Transmitted via Audio Cables by Sensing Electromagnetic Variation Using RFID
EMTap: Eavesdropping on Sound Transmitted via Audio Cables by Sensing Electromagnetic Variation Using RFID Open
When sound signals are transmitted via audio cables in form of current signals, detectable electromagnetic leakage is emitted around the cables, which could reveal the sound content being transmitted. This paper presents a sound eavesdropp…
View article: Advancing Rail Infrastructure: Integrating Digita Twins and Cyber-Physical Systems for Predictive Maintenance
Advancing Rail Infrastructure: Integrating Digita Twins and Cyber-Physical Systems for Predictive Maintenance Open
View article: Generating Difficulty-aware Negative Samples via Conditional Diffusion for Multi-modal Recommendation
Generating Difficulty-aware Negative Samples via Conditional Diffusion for Multi-modal Recommendation Open
View article: Social Relation-Level Privacy Risks and Preservation in Social Recommender Systems
Social Relation-Level Privacy Risks and Preservation in Social Recommender Systems Open
View article: Towards a comprehensive digital wearable tracking system of the patient recovery journey after extremity trauma: a narrative review
Towards a comprehensive digital wearable tracking system of the patient recovery journey after extremity trauma: a narrative review Open
Enabling our patients to recover back to their pre-injury state or beyond is at the core of every treatment in orthopedic trauma surgery. Current methods of assessing functional recovery after extremity trauma largely focus on individual s…
View article: All-textile, chip-less, battery-free body sensor networks enabled by a concentric multi-node hub antenna architecture
All-textile, chip-less, battery-free body sensor networks enabled by a concentric multi-node hub antenna architecture Open
Textile-based, chip-less, wireless body sensor networks (WBANs) offer continuous, wireless monitoring of physiological signals from passive sensors placed on various body locations, representing a promising solution for wearable sensing ap…
View article: Research on Distributed Optimization Scheduling and Its Boundaries in Virtual Power Plants
Research on Distributed Optimization Scheduling and Its Boundaries in Virtual Power Plants Open
To improve the operational efficiency of the Virtual Power Plant (VPP) and the effectiveness and reliability of scheduling boundary characterization, this paper proposes a time-decoupled distributed optimization algorithm. First, based on …
View article: RFSpy: Eavesdropping on Online Conversations with Out-of-Vocabulary Words by Sensing Metal Coil Vibration of Headsets Leveraging RFID
RFSpy: Eavesdropping on Online Conversations with Out-of-Vocabulary Words by Sensing Metal Coil Vibration of Headsets Leveraging RFID Open
Eavesdropping on human sound is one of the most common but harmful ways to threaten personal privacy. As one of the most essential accessories, headsets have been widely used in common online conversations, such as online calls, video meet…
View article: MuDiS: An Audio-independent, Wide-angle, and Leak-free Multi-directional Speaker
MuDiS: An Audio-independent, Wide-angle, and Leak-free Multi-directional Speaker Open
This paper introduces a novel multi-directional speaker, named MuDiS, which utilizes a parametric array to generate highly focused sound beams in multiple directions. The system capitalizes on air nonlinearity to reproduce sound from ultra…
View article: Fusion of Heterogeneous Industrial Wireless Networks: A Survey
Fusion of Heterogeneous Industrial Wireless Networks: A Survey Open
View article: Modeling multi-aspect preferences and intents for multi-behavioral sequential recommendation
Modeling multi-aspect preferences and intents for multi-behavioral sequential recommendation Open
View article: Fusion of Heterogeneous Industrial Wireless Networks: A Survey
Fusion of Heterogeneous Industrial Wireless Networks: A Survey Open
View article: Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples Open
Faced with the threat of identity leakage during voice data publishing, users are engaged in a privacy-utility dilemma when enjoying convenient voice services. Existing studies employ direct modification or text-based re-synthesis to de-id…
View article: Incorporating Heterogeneous User Behaviors and Social Influences for Predictive Analysis
Incorporating Heterogeneous User Behaviors and Social Influences for Predictive Analysis Open
Behavior prediction based on historical behavioral data have practical\nreal-world significance. It has been applied in recommendation, predicting\nacademic performance, etc. With the refinement of user data description, the\ndevelopment o…
View article: Deep Meta-learning in Recommendation Systems: A Survey
Deep Meta-learning in Recommendation Systems: A Survey Open
Deep neural network based recommendation systems have achieved great success as information filtering techniques in recent years. However, since model training from scratch requires sufficient data, deep learning-based recommendation metho…
View article: A Survey on Cross-domain Recommendation: Taxonomies, Methods, and Future Directions
A Survey on Cross-domain Recommendation: Taxonomies, Methods, and Future Directions Open
Traditional recommendation systems are faced with two long-standing obstacles, namely, data sparsity and cold-start problems, which promote the emergence and development of Cross-Domain Recommendation (CDR). The core idea of CDR is to leve…
View article: Distributed Feature Selection for Big Data Using Fuzzy Rough Sets
Distributed Feature Selection for Big Data Using Fuzzy Rough Sets Open
Fuzzy rough-set-based feature selection is an important technique for big data analysis. However, the classic fuzzy rough set algorithm takes all the data correlations into account, which leads to the centralized computing mode, requiring …
View article: Poster
Poster Open
In recent decades, countless efforts have been put into the research and development of short-range wireless communication, which offers a convenient way for numerous applications (e.g., mobile payments, mobile advertisement). Regarding th…
View article: I3
I3 Open
The scrolling interaction is a pervasive human-computer interaction on smartphones, which can reflect intrinsic characteristics during dynamic browsings. Different from extrinsic statistical measures like frequency of visits and dwell time…
View article: Learning Shared Vertex Representation in Heterogeneous Graphs with Convolutional Networks for Recommendation
Learning Shared Vertex Representation in Heterogeneous Graphs with Convolutional Networks for Recommendation Open
Collaborative Filtering (CF) is among the most successful techniques in recommendation tasks. Recent works have shown a boost of performance of CF when introducing the pairwise relationships between users and items or among items (users) u…
View article: Adjusting Matching Algorithm to Adapt to Dynamic Subscriptions in Content-Based Publish/Subscribe Systems
Adjusting Matching Algorithm to Adapt to Dynamic Subscriptions in Content-Based Publish/Subscribe Systems Open
International audience
View article: Evolutionary game-based cooperative strategy for effective capacity of multiple-input-multiple-output communications
Evolutionary game-based cooperative strategy for effective capacity of multiple-input-multiple-output communications Open
Cooperative-relaying networks have great potential for deployment in next-generation wireless communication networks. However, a cooperative-relaying network using two-dimensional multiple-input-multiple-output technology can further enhan…
View article: User-Authentication on Wearable Devices Based on Punch Gesture Biometrics
User-Authentication on Wearable Devices Based on Punch Gesture Biometrics Open
\nDue to commoditization and convenience, wearable technology are interwoven with our daily life. However, privacy sensitive data stored on those devices such as personal email, message can be easily stolen. Most devices require a PIN inpu…
View article: Benefits Analysis of Smart Grid Projects
Benefits Analysis of Smart Grid Projects Open
Smart grids are rolling out internationally, with the United States (U.S.) nearing completion of a significant USD4-plus-billion federal program funded under the American Recovery and Reinvestment Act (ARRA-2009). The emergence of smart gr…