Go back to Yingying's Home

Honors & Awards

Research Interests

Research Grants

Sponsor:National Institute of Health (NIH), MPI, with Tammy Chung (Director of Center for Population Behavioral Health at Robert Wood Johnson Medical School), 2022 - 2024.

Sponsor:National Science Foundation (NSF), PI, Duration: 2022 - 2025.

Sponsor:National Science Foundation (NSF), PI, Duration: 2021 - 2024.

Sponsor:Department of Energy (DOE), Co-PI, collaborating with Yuebin Guo (PI), Saman Zonouz, Alberto Cuitino, Duration: 2020 - 2021.

Sponsor:National Science Foundation (NSF), Co-PI, collaborating with Athina Petropulu (PI) and Chung-Tse Wu, Duration: 2020 - 2023.

Sponsor:National Science Foundation (NSF), PI, Duration: 2020 - 2021.

Sponsor:Cisco Systems Inc., PI, Duration: 2020 - 2021.

Sponsor:BullRun Capital, PI, Duration: 2019 - 2021.

Sponsor:National Science Foundation (NSF), PI, Duration: 2019 - 2022.

Sponsor:National Science Foundation (NSF), PI, Duration: 2018 - 2019.

Sponsor:National Science Foundation (NSF), Co-PI, collaborating with Salim El Rouayheb (PI), Duration: 2018 - 2022.

Sponsor:Army Research Office (ARO), PI, Duration: 2018 - 2021.

Sponsor:National Science Foundation (NSF), PI, Duration: 2017 - 2020.

Sponsor:Army Research Office (ARO), PI, Duration: 2017.

Sponsor:National Science Foundation (NSF), PI, Duration: 2015 - 2019.

Sponsor:National Science Foundation (NSF), PI, Duration: 2014 - 2017.

Sponsor:National Science Foundation (NSF), PI, Duration: 2014 - 2016.

Sponsor:National Science Foundation (NSF), PI, collaborating with Yi Guo (co-PI), Duration: 2013 - 2016.

Sponsor: Army Research Office (ARO), PI, Duration: 2013 - 2016.

Sponsor: National Science Foundation (NSF), PI, Duration: 2013 - 2016.

Sponsor: National Science Foundation (NSF), PI, Duration: 2010 - 2013.

Sponsor: National Science Foundation (NSF), PI, Duration: 2010 - 2015.

Sponsor: National Science Foundation (NSF), PI, Duration: 2010 - 2013.

Sponsor: National Science Foundation (NSF), PI, Duration: 2008 - 2011.

Sponsor: Air Force Research Laboratory (AFRL), PI, Duration: 2012 - 2013.

Sponsor: Department of Defense (DoD), co-PI, collaborating with Joe Mitola (PI) and faculties from ECE Dept. Duration: 2009 - 2012.

Sponsor: Army ARDEC, co-PI, Victor Laurence (PI), Duration: 2009 - 2010.

Sponsor: Army ARDEC, co-PI, Victor Laurence (PI), Duration: 2008 - 2009.

Sponsor: Army ARDEC, co-PI, Victor Laurence (PI), Duration: 2008 - 2009.

Sponsor: Army ARDEC, co-PI, Victor Laurence (PI), Duration: 2007 - 2008.

Past Research Projects

Guardian Angel: Sensing Driver Phone Use to Reduce Driver Distraction & Enabling Pedestrian Safety Services. Cell phone distractions have been a factor in high-profile accidents and are associated with a large number of automobile accidents. This project addresses the fundamental problem of distinguishing between a driver and passenger using a mobile phone, which is the critical input to enable numerous safety and interface enhancements for the driver distraction problem. We are building a detection system that leverages the existing car stereo infrastructure, e.g., the speakers and Bluetooth network. Our solution seeks to address major challenges including the complex multipath environment presented in the small confided space inside a car, minimizing interference between the speakers, and any sounds emitted should be unobtrusive to minimize distraction.

This project has received the Best Paper Award at the ACM International Conference on Mobile Computing and Networking (MobiCom) 2011.

This project is partially funded by the National Science Foundation, PI: Yingying Chen.

The NSF project web site is here.

Research News: The Wall Street Journal, MIT Technology Review, VOA-TV, CNet, WCBS, Yahoo News, CSDN, Sohu, Sina, Fox News Channel and New Jersey My9.

Project Demonstration Videos:

Sensing Driver Phone Use to Reduce Driver Distraction Caused by Cell Phone Usage

Look Up: Enabling Pedestrian Safety Services via Shoe Sensing

Smartphone Privacy

Towards Understanding Smartphone User Privacy. This project focuses on addressing privacy concerns of smartphone users. In particular, it investigates how the usages of the smartphone applications (apps) may reshape users' privacy perceptions and what is the implication of such reshaping. There is only limited understanding on the consequences of user privacy losses, especially when large amount of privacy information leaked from smartphone users across many apps. We investigate how the mobile technology (i.e., smartphone and smartphone apps) can reveal users' personal information and identify the consequences of privacy violations, by taking users' social relationships into consideration. The project facilitates a deep understanding of user privacy in the age of mobile devices and further develops appropriate protective mechanisms. Smartphone user privacy across different levels are analyzed including individual, social and community relationships based on different levels of information leakage. Statistical models, such as Bayesian networks and hidden Markov models, are developed to understand users' temporal privacy leakage patterns based on experimental study.

This project is funded by the National Science Foundation, PI: Yingying Chen.


Building Self-Healing Smart Grid Under Jamming. A key component of a smart grid is its ability to collect useful information from a power grid for enabling control centers to estimate the current states of the power grid. Such information can be delivered to the control centers via wireless or wired networks. We envision that wireless technology will be widely used for local-area communication subsystems in the smart grid (e.g., in distribution networks). However, various attacks with drastic impacts can be launched in wireless networks such as channel jamming attacks and DoS attacks. In particular, jamming attacks can cause a wide range of damages to power grids, e.g., delayed delivery of time-critical messages can prevent control centers from properly controlling the outputs of generators to match load demands. We design a communication subsystem with enhanced self-healing capability under the presence of jamming through intelligent local controller switching. Our framework allows sufficient readings from smart meters to be continuously collected by various local controllers to estimate the states of a power grid under various attack scenarios. Additionally, we provide guidelines on optimal placement of local controllers to ensure effective switching of smart meters under jamming.


Exploiting Location as a New Dimension to Assist Wireless Security. As the increasingly pervasive wireless networks make it even easier to conduct attacks for new and rapidly evolving adversaries, the ubiquity of wireless is redefining security challenges. Thus, there is an urgent need to seek security solutions that can defend against attacks across the current heterogeneous mixes of wireless technologies. Location will be the cornerstone of new wireless services as future wireless services will support the access to resources and information from anywhere at anytime, implying that people will request services and information at different locations and at different times. In this project, we exploit location as a powerful information source to assist cryptographic-based methods to solve fundamental security problems such as detecting identity-based attacks and providing location-aware secure access of network resources.

This project is funded by the National Science Foundation, PI: Yingying Chen.


Utilizing Physical Layer Properties for Secret Key Extraction in Mobile Environments. Information sharing and various data transactions on wireless devices have become an inseparable part of our daily lives. However, securing wireless communication remains challenging in dynamic mobile environments due to the shared nature of wireless medium and lacking of fixed key management infrastructures. Generating secret keys using physical layer information thus has drawn much attention to complement traditional cryptographic-based methods. This project is designing schemes of secret key generation among wireless devices using physical layer information of radio channel such as the Received Signal Strength (RSS) and the Channel State Information (CSI). We currently are focusing on exploring the fine-grained physical layer information (i.e., CSI) from multiple subcarriers of Orthogonal Frequency-Division Multiplexing (OFDM) to achieve higher secret bit generation rate and make the secret key extraction approaches (based on physical-layer characteristics) more practical.

This project is partially supported Army Research Office, PI: Yingying Chen.


Securing Spectrum Usage in Future Radio Systems. The openness of the lower-layer protocol stacks renders cognitive radios (CR) an appealing solution to dynamic spectrum access (DSA). Its open nature will increase the flexibility of spectrum utilization and promote spectrally-efficient communication. Nevertheless, due to the exposure of the protocol stacks to the public, CR platforms can become a tempting target for adversaries or irresponsible secondary users. A misuse of a CR can significantly compromise the benefits of DSA and threaten the privileges of incumbent users. Therefore, having the ability to enforce spectrum etiquettes is critical in future radio systems. We are designing efficient mechanisms, and developing effective frameworks that can both detect anomalous activities in spectrum usage as well as localize adversaries without requiring overhead on wireless devices.

This project is funded by the National Science Foundation, PI: Yingying Chen.


SEMOIS: Secure Mobile Information Sharing System. This project aims to build a secure mobile information sharing system (SEMOIS) that supports secure and privacy-preserving real-time information sharing. SEMOIS will have the ability to store secure data items with flexible access control at insecure storage nodes and enables users to send context-based messages with late-binding features. Specifically, SEMOIS plans to achieve data confidentiality and privacy-preserving through data encryption and encrypted search, and enable intentional name based message dissemination without apriori knowledge of recipients. Additionally, a set of smart learning methods will be developed to extract short-term and long-term geo-social patterns from multimodal sensing data collected by mobile devices for social networking purposes, e.g., geo-social patterns are used to derive hidden social communities.

This project is funded by the National Science Foundation, PI: Yingying Chen.


MILAN: Multi-Modal Passive Intrusion Learning in Pervasive Wireless Environments. This project seeks to develop effective and scalable multi-modal passive intrusion learning techniques that have the capability to detect and track device-free moving objects in pervasive wireless environments through adaptive learning. In contrast to traditional techniques, which require pre-deployment of specialized hardware, and thus not easily deployed for unscheduled tasks and may not be scalable, this project leads to new insights into intrusion learning by mining on wireless environmental data, as well as leading to new approaches to device-free wireless localization, which can be used to assist a broad array of applications, e.g., identification of people trapped in a fire building during emergency evacuation.

This project is funded by the National Science Foundation, PI: Yingying Chen.


Smartphone Applications. Mobile apps, especially those location based ones, are changing the way people work and live every day, and many such apps have to deal with an indoor environment, e.g., shopping malls and airports. In many such environments, the availability of indoor location information can be used to help individuals (directions, just-in-time coupons/promotions) and organizations (passenger flow distribution in airports, customer shopping/movements' pattern in malls). All these apps would require a practical, robust and efficient smartphone indoor localization solution. We are studying a practical and energy efficient indoor localization solution leveraging multiple sensing modalities enabled by smartphones.


Anti-jamming. The increasing pervasiveness of wireless technologies, combined with the limited number of unlicensed bands, will continue to make the radio environment crowded, leading to unintentional radio interference across devices with different communication technologies that share the same spectrum. Meanwhile, the emerging of software defined radios has enabled adversaries to build intentional jammers to disrupt network communication with little effort. To ensure the successful deployment of pervasive wireless networks, we take the view point that it is crucial to localize jammers, since the locations of jammers allow a better physical arrangement of wireless devices that cause unintentional radio interference, and enable a wide range of defense strategies for combating malicious jamming attackers.