4.7 Article

Body-Earth Mover's Distance: A Matching-Based Approach for Sleep Posture Recognition

Journal

IEEE TRANSACTIONS ON BIOMEDICAL CIRCUITS AND SYSTEMS
Volume 10, Issue 5, Pages 1023-1035

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TBCAS.2016.2543686

Keywords

Earth Mover's Distance; pressure image; shape descriptor; sleep posture analysis

Ask authors/readers for more resources

Sleep posture is a key component in sleep quality assessment and pressure ulcer prevention. Currently, body pressure analysis has been a popular method for sleep posture recognition. In this paper, a matching-based approach, Body-Earth Mover's Distance (BEMD), for sleep posture recognition is proposed. BEMD treats pressure images as weighted 2D shapes, and combines EMD and Euclidean distance for similarity measure. Compared with existing work, sleep posture recognition is achieved with posture similarity rather than multiple features for specific postures. A pilot study is performed with 14 persons for six different postures. The experimental results show that the proposed BEMD can achieve 91.21% accuracy, which outperforms the previous method with an improvement of 8.01%.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference

Hongwei Luo, Yijie Shen, Feng Lin, Guoai Xu

Summary: This paper introduces an attack strategy against speaker verification systems based on deep neural networks, with a success rate of up to 82% and high imperceptibility, capable of deceiving the system while remaining hidden from human hearing or machine discrimination.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

Scanning the Voice of Your Fingerprint With Everyday Surfaces

Aditya Singh Rathore, Chenhan Xu, Weijin Zhu, Afee Daiyan, Kun Wang, Feng Lin, Kui Ren, Wenyao Xu

Summary: This paper introduces a new fingerprint sensing technology called SonicPrint, which utilizes the intrinsic fingerprint ridge information in sonic wave for user identification. It is a practical technology that requires no hardware modifications and leverages the built-in microphones in smart devices. The experimental results show a high accuracy rate.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2022)

Article Computer Science, Information Systems

VocalPrint: A mmWave-Based Unmediated Vocal Sensing System for Secure Authentication

Huining Li, Chenhan Xu, Aditya Singh Rathore, Zhengxiong Li, Hanbin Zhang, Chen Song, Kun Wang, Lu Su, Feng Lin, Kui Ren, Wenyao Xu

Summary: With the increasing use of voice-controlled devices, voice metrics have become popular for user identification. However, voice biometrics are susceptible to replay attacks and ambient noise. In this paper, the authors present VocalPrint, a mmWave interrogation system that directly captures and analyzes vocal vibrations for user authentication. By exploiting the disturbance in radio frequency signals caused by vocal vibrations around the near-throat area, VocalPrint is able to isolate ambient noise and preserve fine-grained vocal biometric properties. Experimental results demonstrate the resilience of VocalPrint against complex noise interference and spoof attacks, achieving over 96 percent authentication accuracy even under unfavorable conditions.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Hardware & Architecture

Reliable Multi-Factor User Authentication With One Single Finger Swipe

Jianwei Liu, Kaiyan Cui, Xiang Zou, Jinsong Han, Feng Lin, Kui Ren

Summary: In this paper, the authors propose a secure and user-friendly multi-factor user authentication system called BioDraw. It utilizes four categories of biometrics and a pattern-based password for user identification and authentication. The system achieves high authentication accuracy and is effective in defending against various attacks, as demonstrated through extensive experiments.

IEEE-ACM TRANSACTIONS ON NETWORKING (2023)

Proceedings Paper Computer Science, Theory & Methods

A Non-intrusive and Adaptive Speaker De-Identification Scheme Using Adversarial Examples

Meng Chen, Li Lu, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin, Kui Ren

Summary: Faced with the threat of identity leakage during voice data publishing, users are engaged in a privacy-utility dilemma while enjoying convenient voice services. Existing studies employ direct modification or text-based re-synthesis to de-identify users' voices, but resulting in inconsistent audibility for human participants and not adaptive to informed attacks. In this poster, we propose a non-intrusive and adaptive speaker de-identification scheme to balance the privacy and utility of voice services.

PROCEEDINGS OF THE 2022 THE 28TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2022 (2022)

Proceedings Paper Computer Science, Theory & Methods

mmEve: Eavesdropping on Smartphone's Earpiece via COTS mmWave Device

Chao Wang, Feng Lin, Tiantian Liu, Kaidi Zheng, Zhibo Wang, Zhengxiong Li, Ming-Chun Huang, Wenyao Xu, Kui Ren

Summary: This study presents a remote attack on smartphone earpieces using mmWave sensors to eavesdrop on emitted speech. Through optimizing the fitting function and denoising scheme, the attack range can be extended to 6-8m, posing a threat to 23 different models of smartphones.

PROCEEDINGS OF THE 2022 THE 28TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2022 (2022)

Proceedings Paper Computer Science, Hardware & Architecture

mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect

Chao Wang, Feng Lin, Tiantian Liu, Ziwei Liu, Yijie Shen, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren

Summary: This paper presents mmPhone, a novel acoustic eavesdropping system that recovers loudspeaker speech protected by soundproof environments. By utilizing mmWaves to sense the piezoelectric film and decoding the speech, mmPhone is capable of recovering high-quality and intelligible speech from a certain distance.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022) (2022)

Article Computer Science, Information Systems

A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses

Zhibo Wang, Defang Liu, Yunan Sun, Xiaoyi Pang, Peng Sun, Feng Lin, John C. S. Lui, Kui Ren

Summary: With the development of communication technologies and IoT infrastructures, home automation systems have become popular for providing convenient smart-home services. However, there are security risks in the deployment and application of these systems, which require research on attack and defense. This paper presents a comprehensive survey on the security of home automation systems, including system architecture, attack classification, vulnerability analysis, security requirements, existing defense methods, and open issues for future research.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers

Yike Chen, Ming Gao, Yimin Li, Lingfeng Zhang, Li Lu, Feng Lin, Jinsong Han, Kui Ren

Summary: This paper investigates the ability of ultrasonic microphone jammers (UMJs) to resist covert eavesdropping and proposes a comprehensive framework for evaluating the resilience of UMJs. Extensive assessment results reveal that most existing UMJs are vulnerable to sophisticated adverse approaches, and suggestions for future designs of UMJs are presented.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022) (2022)

Article Computer Science, Information Systems

Wavesdropper: Through-wallWord Detection of Human Speech via Commercial mmWave Devices

Chao Wang, Feng Lin, Zhongjie Ba, Fan Zhang, Wenyao Xu, Kui Ren

Summary: Most existing eavesdropping attacks that rely on sound waves for speech retrieval are ineffective in scenarios protected by soundproof materials. This paper presents a novel method using portable and commercial off-the-shelf mmWave devices to compromise human speech in isolated rooms, along with a word detection system called Wavesdropper that utilizes a mmWave probe to sense throat vibrations and recover speech contents. Experimental results show the effectiveness and accuracy of Wavesdropper in speech recognition.

PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT (2022)

Proceedings Paper Computer Science, Hardware & Architecture

ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures

Li Lu, Zhongjie Ba, Feng Lin, Jinsong Han, Kui Ren

Summary: This paper introduces ActListener, a method that eavesdrops on user activities using WiFi infrastructure without their knowledge. The proposed attack does not require physical access to the user's device or prior knowledge of activity recognition models and device locations. Experimental results show that ActListener achieves good performance in recovering original signals and activity recognition.

2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022) (2022)

Proceedings Paper Biophysics

Speech Acquisition and Recovery Based on Piezoelectric Effect in the mmWave Band

Kaidi Zheng, Chao Wang, Zhanglei Shu, Feng Lin

Summary: This paper proposes a novel speech acquisition method that directly senses sound waves through the air instead of relying on sound-induced vibrations. The study finds that mmWave signals can penetrate soundproofing materials, allowing for speech recovery through obstacles. To combat the loss of mmWave signals, a speech enhancement method based on deep neural networks is developed.

2022 IEEE MTT-S INTERNATIONAL MICROWAVE BIOMEDICAL CONFERENCE (IMBIOC) (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Hand-Key: Leveraging Multiple Hand Biometrics for Attack-Resilient User Authentication Using COTS RFID

Jianwei Liu, Xiang Zou, Feng Lin, Jinsong Han, Xian Xu, Kui Ren

Summary: This paper introduces Hand-Key, a novel user authentication system that utilizes RFID technology to collect both inner and outer body features for user identification, addressing the challenge of balancing user-friendliness and security in biometric-based authentication. By leveraging the inherent randomness of RFID systems, Hand-Key is immune to replay attacks and achieves an authentication success rate of 99%+.

2021 IEEE 41ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2021) (2021)

Proceedings Paper Telecommunications

PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting

Liu Liu, Hanlin Yu, Zhongjie Ba, Li Lu, Feng Lin, Kui Ren

Summary: Facial recognition technology plays a crucial role in mobile authentication, but faces various impersonation attacks. To address this issue, this paper proposes a new anti-spoofing facial recognition system, PassFace, which uses raw facial videos as the second factor for authentication to enhance security and resist attacks. Experiment results show that PassFace can achieve satisfactory performance in authentication and attack resistance.

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021) (2021)

Proceedings Paper Computer Science, Hardware & Architecture

RFace: Anti-Spoofing Facial Authentication Using COTS RFID

Weiye Xu, Jianwei Liu, Shimin Zhang, Yuanqing Zheng, Feng Lin, Jinsong Han, Fu Xiao, Kui Ren

Summary: The research introduces a novel privacy-preserving anti-spoofing FA system called RFace, which extracts both 3D geometry and inner biomaterial features of faces using a COTS RFID tag array. Experimental results show that RFace has a high authentication success rate and is not deceived by any spoofing attacks.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021) (2021)

No Data Available