scispace - formally typeset
T

Ting Jiang

Researcher at Beijing University of Posts and Telecommunications

Publications -  93
Citations -  619

Ting Jiang is an academic researcher from Beijing University of Posts and Telecommunications. The author has contributed to research in topics: Gesture recognition & Gesture. The author has an hindex of 9, co-authored 93 publications receiving 414 citations.

Papers
More filters
Journal ArticleDOI

Physical-Layer Authentication Based on Extreme Learning Machine

TL;DR: Simulation results show that the proposed physical-layer authentication scheme based on extreme learning machine that exploit multi-dimensional characters of radio channels and use the training data generated from the spoofing model to improve the spoofed detection accuracy.
Journal ArticleDOI

Device-Free Sensing for Personnel Detection in a Foliage Environment

TL;DR: This is the first time that a DFS-based sensing approach is demonstrated to have a potential to distinguish between human and small-animal targets in a foliage environment.
Journal ArticleDOI

Internet of Mission-Critical Things: Human and Animal Classification—A Device-Free Sensing Approach

TL;DR: This paper presents a relatively low-cost, but robust approach that uses a combination of device-free sensing (DFS) and machine-learning technologies to tackle the issue of distinguishing between human and animal targets in a cost-effective way.
Journal ArticleDOI

Impact of Seasonal Variations on Foliage Penetration Experiment: A WSN-Based Device-Free Sensing Approach

TL;DR: An experiment is conducted in four seasons of WSN-based device-free sensing for FOPEN, and it is shown that the average classification accuracy of the presented approach can be improved by at least 20% under all seasons with an ensured robustness.
Journal ArticleDOI

Physical Layer Authentication Enhancement Using a Gaussian Mixture Model

TL;DR: This paper proposes a physical (PHY)-layer security authentication scheme that takes advantage of channel randomness to detect spoofing attacks in wireless networks and uses a Gaussian mixture model (GMM) to detection spoofing attackers.