scispace - formally typeset
Search or ask a question
Author

Daqing Zhang

Bio: Daqing Zhang is an academic researcher from Peking University. The author has contributed to research in topics: Context (language use) & Mobile computing. The author has an hindex of 67, co-authored 331 publications receiving 16675 citations. Previous affiliations of Daqing Zhang include Institut Mines-Télécom & Institute for Infocomm Research Singapore.


Papers
More filters
Book ChapterDOI
10 Jun 2015
TL;DR: In this paper, a real-time, non-intrusive, and low-cost indoor fall detector, called Anti-Fall, was proposed. And the CSI phase difference over two antennas is identified as the salient feature to reliably segment the fall and fall-like activities, both phase and amplitude information of CSI is then exploited to accurately separate the fall from other fall- like activities.
Abstract: Fall is one of the major health threats and obstacles to independent living for elders, timely and reliable fall detection is crucial for mitigating the effects of falls. In this paper, leveraging the fine-grained Channel State Information (CSI) and multi-antenna setting in commodity WiFi devices, we design and implement a real-time, non-intrusive, and low-cost indoor fall detector, called Anti-Fall. For the first time, the CSI phase difference over two antennas is identified as the salient feature to reliably segment the fall and fall-like activities, both phase and amplitude information of CSI is then exploited to accurately separate the fall from other fall-like activities. Experimental results in two indoor scenarios demonstrate that Anti-Fall consistently outperforms the state-of-the-art approach WiFall, with 10% higher detection rate and 10% less false alarm rate on average.

69 citations

Journal ArticleDOI
TL;DR: This article analyzes the main causes of energy consumption in MCS and presents a general energy saving framework named ESCrowd that is used to describe the different detailed MCS energy saving techniques.
Abstract: With the prevalence of sensor-rich smartphones, MCS has become an emerging paradigm to perform urban sensing tasks in recent years. In MCS systems, it is important to minimize the energy consumption on devices of mobile users, as high energy consumption severely reduces their participation willingness. In this article, we provide a comprehensive review of energy saving techniques in MCS and identify future research opportunities. Specifically, we analyze the main causes of energy consumption in MCS and present a general energy saving framework named ESCrowd that we use to describe the different detailed MCS energy saving techniques. We further present how the various energy saving techniques are utilized and adopted within MCS applications and point out their existing limitations, which inform and guide future research directions.

67 citations

Journal ArticleDOI
TL;DR: A fine-grained multitask allocation framework (MTPS), which assigns a subset of tasks to each participant in each cycle, considering the user burden of switching among varying sensing tasks, and adopts an iterative greedy process to achieve a near-optimal allocation solution.
Abstract: For participatory sensing, task allocation is a crucial research problem that embodies a tradeoff between sensing quality and cost. An organizer usually publishes and manages multiple tasks utilizing one shared budget. Allocating multiple tasks to participants, with the objective of maximizing the overall data quality under the shared budget constraint, is an emerging and important research problem. We propose a fine-grained multitask allocation framework (MTPS), which assigns a subset of tasks to each participant in each cycle. Specifically, considering the user burden of switching among varying sensing tasks, MTPS operates on an attention-compensated incentive model where, in addition to the incentive paid for each specific sensing task, an extra compensation is paid to each participant if s/he is assigned with more than one task type. Additionally, based on the prediction of the participants’ mobility pattern, MTPS adopts an iterative greedy process to achieve a near-optimal allocation solution. Extensive evaluation based on real-world mobility data shows that our approach outperforms the baseline methods, and theoretical analysis proves that it has a good approximation bound.

67 citations

Book ChapterDOI
06 Dec 2011
TL;DR: This paper proposes a real-time method, iBOAT, that is able to detect anomalous trajectories “on-the-fly”, as well as identify which parts of the trajectory are responsible for its anomalousness.
Abstract: Trajectories obtained from GPS-enabled taxis grant us an opportunity to not only extract meaningful statistics, dynamics and behaviors about certain urban road users, but also to monitor adverse and/or malicious events. In this paper we focus on the problem of detecting anomalous routes by comparing against historically “normal” routes. We propose a real-time method, iBOAT, that is able to detect anomalous trajectories “on-the-fly”, as well as identify which parts of the trajectory are responsible for its anomalousness. We evaluate our method on a large dataset of taxi GPS logs and verify that it has excellent accuracy (AUC ≥ 0.99) and overcomes many of the shortcomings of other state-of-the-art methods.

66 citations

Journal ArticleDOI
Dan Wu1, Ruiyang Gao1, Youwei Zeng1, Jinyi Liu1, Leye Wang1, Tao Gu2, Daqing Zhang1 
18 Mar 2020
TL;DR: FingerDraw is the first sub-wavelength level finger motion tracking system using commodity WiFi devices, without attaching any sensor to finger, and can reconstruct finger drawing trajectory such as digits, alphabets, and symbols with the setting of one WiFi transmitter and two WiFi receivers.
Abstract: This paper explores the possibility of tracking finger drawings in the air leveraging WiFi signals from commodity devices. Prior solutions typically require user to hold a wireless transmitter, or need proprietary wireless hardware. They can only recognize a small set of pre-defined hand gestures. This paper introduces FingerDraw, the first sub-wavelength level finger motion tracking system using commodity WiFi devices, without attaching any sensor to finger. FingerDraw can reconstruct finger drawing trajectory such as digits, alphabets, and symbols with the setting of one WiFi transmitter and two WiFi receivers. It uses a two-antenna receiver to sense the sub-wavelength scale displacement of finger motion in each direction. The theoretical underpinning of FingerDraw is our proposed CSI-quotient model, which uses the channel quotient between two antennas of the receiver to cancel out the noise in CSI amplitude and the random offsets in CSI phase, and quantifies the correlation between CSI value dynamics and object displacement. This channel quotient is sensitive to and enables us to detect small changes in In-phase and Quadrature parts of channel state information due to finger movement. Our experimental results show that the overall median tracking accuracy is 1.27 cm, and the recognition of drawing ten digits in the air achieves an average accuracy of over 93.0%.

65 citations


Cited by
More filters
01 Jan 2002

9,314 citations

Journal ArticleDOI
TL;DR: This paper surveys context awareness from an IoT perspective and addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT.
Abstract: As we are moving towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future. These sensors continuously generate enormous amounts of data. However, in order to add value to raw sensor data we need to understand it. Collection, modelling, reasoning, and distribution of context in relation to sensor data plays critical role in this challenge. Context-aware computing has proven to be successful in understanding sensor data. In this paper, we survey context awareness from an IoT perspective. We present the necessary background by introducing the IoT paradigm and context-aware fundamentals at the beginning. Then we provide an in-depth analysis of context life cycle. We evaluate a subset of projects (50) which represent the majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade (2001-2011) based on our own taxonomy. Finally, based on our evaluation, we highlight the lessons to be learnt from the past and some possible directions for future research. The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. Our goal is not only to analyse, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards the IoT.

2,542 citations

Proceedings ArticleDOI
22 May 2017
TL;DR: This work quantitatively investigates how machine learning models leak information about the individual data records on which they were trained and empirically evaluates the inference techniques on classification models trained by commercial "machine learning as a service" providers such as Google and Amazon.
Abstract: We quantitatively investigate how machine learning models leak information about the individual data records on which they were trained. We focus on the basic membership inference attack: given a data record and black-box access to a model, determine if the record was in the model's training dataset. To perform membership inference against a target model, we make adversarial use of machine learning and train our own inference model to recognize differences in the target model's predictions on the inputs that it trained on versus the inputs that it did not train on. We empirically evaluate our inference techniques on classification models trained by commercial "machine learning as a service" providers such as Google and Amazon. Using realistic datasets and classification tasks, including a hospital discharge dataset whose membership is sensitive from the privacy perspective, we show that these models can be vulnerable to membership inference attacks. We then investigate the factors that influence this leakage and evaluate mitigation strategies.

2,059 citations