Visible to the public Biblio

Filters: Author is Jiang, Qi  [Clear All Filters]
2020-08-03
Liu, Fuxiang, Jiang, Qi.  2019.  Research on Recognition of Criminal Suspects Based on Foot Sounds. 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). :1347–1351.
There are two main contributions in this paper: Firstly, by analyzing the frequency domain features and Mel domain features, we can identify footstep events and non-footstep events. Secondly, we compared the two footstep sound signals of the same person in frequency domain under different experimental conditions, finding that almost all of their peak frequencies and trough frequencies in the main frequency band are respectively corresponding one-to-one. However for the two different people, even under the same experimental conditions, it is difficult to have the same peak frequencies and trough frequencies in the main frequency band of their footstep sound signals. Therefore, this feature of footstep sound signals can be used to identify different people.
2020-03-02
Jiang, Qi, Zhang, Xin, Zhang, Ning, Tian, Youliang, Ma, Xindi, Ma, Jianfeng.  2019.  Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV. 2019 IEEE/CIC International Conference on Communications in China (ICCC). :195–200.
As an extension of Internet of Things (IoT) in transportation sector, the Internet of Vehicles (IoV) can greatly facilitate vehicle management and route planning. With ever-increasing penetration of IoV, the security and privacy of driving data should be guaranteed. Moreover, since vehicles are often left unattended with minimum human interventions, the onboard sensors are vulnerable to physical attacks. Therefore, the physically secure authentication and key agreement (AKA) protocol is urgently needed for IoV to implement access control and information protection. In this paper, physical unclonable function (PUF) is introduced in the AKA protocol to ensure that the system is secure even if the user devices or sensors are compromised. Specifically, PUF, as a hardware fingerprint generator, eliminates the storage of any secret information in user devices or vehicle sensors. By combining password with PUF, the user device cannot be used by someone else to be successfully authenticated as the user. By resorting to public key cryptography, the proposed protocol can provide anonymity and desynchronization resilience. Finally, the elaborate security analysis demonstrates that the proposed protocol is free from the influence of known attacks and can achieve expected security properties, and the performance evaluation indicates the efficiency of our protocol.