scispace - formally typeset
Search or ask a question
Author

Daqing Zhang

Bio: Daqing Zhang is an academic researcher from Peking University. The author has contributed to research in topics: Context (language use) & Mobile computing. The author has an hindex of 67, co-authored 331 publications receiving 16675 citations. Previous affiliations of Daqing Zhang include Institut Mines-Télécom & Institute for Infocomm Research Singapore.


Papers
More filters
Book ChapterDOI
26 Oct 2010
TL;DR: The aim of this position paper is to identify this emerging research area, present the research background and some references to the relevant research fields, define the general system framework, predict some potential application areas, and propose some initial thoughts about the future research issues and challenges in social and community intelligence.
Abstract: As a result of the recent explosion of sensor-equipped mobile phone market, the phenomenal growth of Internet and social network users, and the large deployment of sensor network in public facilities, private buildings and outdoor environments, the "digital footprints" left by people while interacting with cyber-physical spaces are accumulating with an unprecedented breadth, depth and scale. The technology trend towards pervasive sensing and large-scale social and community computing is making "social and community intelligence (SCI)", a new research area take shape, that aims at mining the "digital footprints" to reveal the patterns of individual, group and societal behaviours. It is believed that the SCI technology has the potential to revolutionize the field of context-aware computing. The aim of this position paper is to identify this emerging research area, present the research background and some references to the relevant research fields, define the general system framework, predict some potential application areas, and propose some initial thoughts about the future research issues and challenges in social and community intelligence.

63 citations

Journal ArticleDOI
TL;DR: This article proposes a novel crowdsensing task allocation framework called SPACE-TA (SPArse Cost-Effective Task Allocation), combining compressive sensing, statistical analysis, active learning, and transfer learning, to dynamically select a small set of subareas for sensing in each timeslot (cycle), while inferring the data of unsensed subarea under a probabilistic data quality guarantee.
Abstract: Data quality and budget are two primary concerns in urban-scale mobile crowdsensing. Traditional research on mobile crowdsensing mainly takes sensing coverage ratio as the data quality metric rather than the overall sensed data error in the target-sensing area. In this article, we propose to leverage spatiotemporal correlations among the sensed data in the target-sensing area to significantly reduce the number of sensing task assignments. In particular, we exploit both intradata correlations within the same type of sensed data and interdata correlations among different types of sensed data in the sensing task. We propose a novel crowdsensing task allocation framework called SPACE-TA (SPArse Cost-Effective Task Allocation), combining compressive sensing, statistical analysis, active learning, and transfer learning, to dynamically select a small set of subareas for sensing in each timeslot (cycle), while inferring the data of unsensed subareas under a probabilistic data quality guarantee. Evaluations on real-life temperature, humidity, air quality, and traffic monitoring datasets verify the effectiveness of SPACE-TA. In the temperature-monitoring task leveraging intradata correlations, SPACE-TA requires data from only 15.5% of the subareas while keeping the inference error below 0.25°C in 95% of the cycles, reducing the number of sensed subareas by 18.0% to 26.5% compared to baselines. When multiple tasks run simultaneously, for example, for temperature and humidity monitoring, SPACE-TA can further reduce ∼10% of the sensed subareas by exploiting interdata correlations.

62 citations

Journal ArticleDOI
TL;DR: This article presents the most cited definition and classification for wandering and examines existing solutions for managing wandering in terms of the proposed categorization of wandering research, namely event monitoring-based wandering discovery, trajectory tracking- based wandering detection, and location combined with Geofence-based prevention of wandering-related adverse results.

62 citations

Journal ArticleDOI
TL;DR: A real-time and contactless respiration monitoring system by directly sensing the exhaled airflow from breathing using ultrasound signals with off-the-shelf speaker and microphone and mathematically model the relationship between the Doppler frequency change and the direction of breathing airflow.
Abstract: Recent years have witnessed advances of Internet of Things technologies and their applications to enable contactless sensing and elderly care in smart homes. Continuous and real-time respiration monitoring is one of the important applications to promote assistive living for elders during sleep and attracted wide attention in both academia and industry. Most of the existing respiration monitoring systems require expensive and specialized devices to sense chest displacement. However, chest displacement is not a direct indicator of breathing and thus false detection may often occur. In this paper, we design and implement a real-time and contactless respiration monitoring system by directly sensing the exhaled airflow from breathing using ultrasound signals with off-the-shelf speaker and microphone. Exhaled airflow from breathing can be regarded as air turbulence, which scatters the sound wave and results in Doppler effect. Our system works as an acoustic radar which transmits sound wave and detects the Doppler effect caused by breathing airflow. We mathematically model the relationship between the Doppler frequency change and the direction of breathing airflow. Based on this model, we design a minimum description length-based algorithm to effectively capture the Doppler effect caused by exhaled airflow. We conduct extensive experiments with 25 participants (7 elders, 2 young kids, and 16 adults, including 11 females and 14 males) in four different rooms. The participants take four different sleep postures (lying on one’s back, on right/left side, and on one’s stomach) in different positions of the bed. Experiment results show that our system achieves a median error lower than 0.3 breaths/min (2%) for respiration monitoring and can accurately identify Apnea. The results also demonstrate that the system is robust to different respiration styles (shallow, normal, and deep), respiration rate variation, ambient noise, sensing distance variation (within 0.7 m), and transmitted signal frequency variation.

59 citations

Journal ArticleDOI
01 Mar 2011
TL;DR: Three corresponding programming modes are elaborated by showing how a context-aware game has been developed with the support of the OPEN framework, and the usability of the system is validated through an initial user study.
Abstract: OPEN is an ontology-based programming framework for rapid prototyping, sharing, and personalization of context-aware applications. Unlike previous systems that provide programming support for single group of users, OPEN provides different programming support for users with diverse technical skills. According to the programming requirements of different users, several cooperation patterns are identified, and the mechanisms to facilitate resource sharing and reuse are built into the framework. Three corresponding programming modes are elaborated by showing how a context-aware game has been developed with the support of the OPEN framework, and the usability of our system is validated through an initial user study.

56 citations


Cited by
More filters
01 Jan 2002

9,314 citations

Journal ArticleDOI
TL;DR: This paper surveys context awareness from an IoT perspective and addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT.
Abstract: As we are moving towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future. These sensors continuously generate enormous amounts of data. However, in order to add value to raw sensor data we need to understand it. Collection, modelling, reasoning, and distribution of context in relation to sensor data plays critical role in this challenge. Context-aware computing has proven to be successful in understanding sensor data. In this paper, we survey context awareness from an IoT perspective. We present the necessary background by introducing the IoT paradigm and context-aware fundamentals at the beginning. Then we provide an in-depth analysis of context life cycle. We evaluate a subset of projects (50) which represent the majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade (2001-2011) based on our own taxonomy. Finally, based on our evaluation, we highlight the lessons to be learnt from the past and some possible directions for future research. The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. Our goal is not only to analyse, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards the IoT.

2,542 citations

Proceedings ArticleDOI
22 May 2017
TL;DR: This work quantitatively investigates how machine learning models leak information about the individual data records on which they were trained and empirically evaluates the inference techniques on classification models trained by commercial "machine learning as a service" providers such as Google and Amazon.
Abstract: We quantitatively investigate how machine learning models leak information about the individual data records on which they were trained. We focus on the basic membership inference attack: given a data record and black-box access to a model, determine if the record was in the model's training dataset. To perform membership inference against a target model, we make adversarial use of machine learning and train our own inference model to recognize differences in the target model's predictions on the inputs that it trained on versus the inputs that it did not train on. We empirically evaluate our inference techniques on classification models trained by commercial "machine learning as a service" providers such as Google and Amazon. Using realistic datasets and classification tasks, including a hospital discharge dataset whose membership is sensitive from the privacy perspective, we show that these models can be vulnerable to membership inference attacks. We then investigate the factors that influence this leakage and evaluate mitigation strategies.

2,059 citations