scispace - formally typeset
Search or ask a question
Author

Daqing Zhang

Bio: Daqing Zhang is an academic researcher from Peking University. The author has contributed to research in topics: Context (language use) & Mobile computing. The author has an hindex of 67, co-authored 331 publications receiving 16675 citations. Previous affiliations of Daqing Zhang include Institut Mines-Télécom & Institute for Infocomm Research Singapore.


Papers
More filters
Proceedings ArticleDOI
02 Jul 2007
TL;DR: This paper proposes a lightweight framework that can aggregate services in smart spaces, and allow mobile users to spontaneously discover them without any specialized installation, and presents the system requirements for spontaneous interaction, the service framework design and implementation details.
Abstract: With mobile devices and wireless hotspots becoming more prevalent, customers can desire greater access to media and services that can be achieved from the marrying of these two technologies. However, often existing devices need to be augmented with hardware and software to achieve this connectivity, and the existing services are heterogeneous and incompatible with one another. By leveraging the captive portal mechanism and proposed context-aware technologies, we propose a lightweight framework that can aggregate these services in smart spaces, and allow mobile users to spontaneously discover them without any specialized installation. In this paper, we present the system requirements for spontaneous interaction, the service framework design and implementation details.

5 citations

Book ChapterDOI
26 Oct 2010
TL;DR: An unobtrusive sleep postures detection and pattern recognition approaches based on the proposed sleep monitoring system, the processing methods of experimental data and the classification algorithms for sleep pattern recognition are discussed.
Abstract: Quality of sleep is an important attribute of an elder's health state and its assessment is still a challenge. The sleep pattern is a significant aspect to evaluate the quality of sleep, and how to recognize elder's sleep pattern is an important issue for elder-care community. With the pressure sensor matrix to monitor the elder's sleep behavior in bed, this paper presents an unobtrusive sleep postures detection and pattern recognition approaches. Based on the proposed sleep monitoring system, the processing methods of experimental data and the classification algorithms for sleep pattern recognition are also discussed.

5 citations

Journal ArticleDOI
15 Sep 2021
TL;DR: In this paper, the authors summarized the sensing range of existing wireless technologies and showed that long-range through-wall sensing is still missing with wireless sensing, which is a limitation of traditional wireless sensing.
Abstract: Wireless sensing received a great amount of attention in recent years and various wireless technologies have been exploited for sensing, including WiFi [1], RFID [2], ultrasound [3], 60 GHz mmWave [4] and visible light [5]. The key advantage of wireless sensing over traditional sensing is that the target does not need to be equipped with any sensor(s) and the wireless signal itself is being used for sensing. Exciting new applications have been enabled, such as passive localization [6] and contactless human activity sensing [7]. While promising in many aspects, one key limitation of current wireless sensing techniques is the very small sensing range. This is because while both direct path and reflection path signals are used for communication, only the weak target-reflection signals can be used for sensing. Take Wi-Fi as an example: the communication range can reach 20 to 50 meters indoors but its sensing range is merely 4 to 8 meters. This small range further limits the through-wall sensing capability of Wi-Fi. On the other hand, many applications do require long-range and through-wall sensing capability. In a fire rescue scenario, the sensing device cannot be placed close to the building, and the long-range through-wall sensing capabilities are critical for detecting people deep inside the building. Table I summarizes the sensing range of existing wireless technologies. We can see that long-range through-wall sensing is still missing with wireless sensing.

5 citations

Book ChapterDOI
19 Jun 2013
TL;DR: A data mining method is proposed to extract the most frequent sequential sequences of steps inside each individual activity of a set of daily activities so that these patterns can be used to model human daily activities for activity recognition purpose, or to directly instruct/prompt elders with impaired memory when they perform daily routines.
Abstract: One of the most challenging issues faced by many elders is the over-decreasing independence mainly caused by impaired physical, cognitive, and/or sensory abilities. Activity recognition can be used to help elders live longer in their own homes independently, by providing assurance of safety, instructing performance of activity and assessing cognitive status. In this work, we propose to discover both intra- and inter-activity association patterns from daily routines of elderly people. Specifically, a data mining method is proposed to extract the most frequent sequential sequences of steps inside each individual activity (i.e., intra-activity pattern) and activities (i.e., inter-activity pattern) of a set of daily activities. These patterns can then be used to model human daily activities for activity recognition purpose, or to directly instruct/prompt elders with impaired memory when they perform daily routines. The experimental results conducted on two individuals’ datasets of daily activities show that our proposed approach is workable to discover these association patterns.

5 citations

Journal ArticleDOI
TL;DR: The new term mobile crowd sensing and computing (MCSC) is raised to characterize crowd intelligence extraction from large-scale and heterogeneous usercontributed data and aggregates and fuses the data in the cloud for crowd Intelligence extraction and human-centric service delivery.
Abstract: Participatory sensing [Burke 2006] is an emerging computing paradigm that tasks everyday mobile devices to form participatory sensor networks. It allows the increasing number of mobile phone users to share local knowledge acquired by their sensorenhanced devices, such as monitoring of pollution or noise levels and traffic conditions. The sensing data from volunteer contributors can be further analyzed and processed to form crowd intelligence [Zhang et al. 2011], which can be elaborated into three dimensions: personal awareness, social awareness, and urban awareness. Layered on these concepts, we have raised the new term mobile crowd sensing and computing (MCSC) to characterize crowd intelligence extraction from large-scale and heterogeneous usercontributed data [Guo et al. 2014]. A formal definition of MCSC is as follows: a new sensing paradigm that empowers ordinary citizens to contribute data sensed or generated from their mobile devices, then aggregates and fuses the data in the cloud for crowd intelligence extraction and human-centric service delivery. It has the following three features compared to participatory sensing:

5 citations


Cited by
More filters
01 Jan 2002

9,314 citations

Journal ArticleDOI
TL;DR: This paper surveys context awareness from an IoT perspective and addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT.
Abstract: As we are moving towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future. These sensors continuously generate enormous amounts of data. However, in order to add value to raw sensor data we need to understand it. Collection, modelling, reasoning, and distribution of context in relation to sensor data plays critical role in this challenge. Context-aware computing has proven to be successful in understanding sensor data. In this paper, we survey context awareness from an IoT perspective. We present the necessary background by introducing the IoT paradigm and context-aware fundamentals at the beginning. Then we provide an in-depth analysis of context life cycle. We evaluate a subset of projects (50) which represent the majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade (2001-2011) based on our own taxonomy. Finally, based on our evaluation, we highlight the lessons to be learnt from the past and some possible directions for future research. The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. Our goal is not only to analyse, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards the IoT.

2,542 citations

Proceedings ArticleDOI
22 May 2017
TL;DR: This work quantitatively investigates how machine learning models leak information about the individual data records on which they were trained and empirically evaluates the inference techniques on classification models trained by commercial "machine learning as a service" providers such as Google and Amazon.
Abstract: We quantitatively investigate how machine learning models leak information about the individual data records on which they were trained. We focus on the basic membership inference attack: given a data record and black-box access to a model, determine if the record was in the model's training dataset. To perform membership inference against a target model, we make adversarial use of machine learning and train our own inference model to recognize differences in the target model's predictions on the inputs that it trained on versus the inputs that it did not train on. We empirically evaluate our inference techniques on classification models trained by commercial "machine learning as a service" providers such as Google and Amazon. Using realistic datasets and classification tasks, including a hospital discharge dataset whose membership is sensitive from the privacy perspective, we show that these models can be vulnerable to membership inference attacks. We then investigate the factors that influence this leakage and evaluate mitigation strategies.

2,059 citations