


default search action
Yili Ren
Person information
- affiliation: University of South Florida, Tampa, FL, USA
- affiliation (former): Florida State University, USA
- affiliation (former): Beihang University, Beijing, China
2020 – today
- 2024
- [j10]Yichao Wang
, Yili Ren
, Jie Yang
:
Multi-Subject 3D Human Mesh Construction Using Commodity WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(1): 23:1-23:25 (2024) - [j9]Bofan Li
, Yili Ren
, Yichao Wang
, Jie Yang
:
SpaceBeat: Identity-aware Multi-person Vital Signs Monitoring Using Commodity WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(3): 113:1-113:23 (2024) - 2023
- [c16]Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
Person Re-identification in 3D Space: A WiFi Vision-based Approach. USENIX Security Symposium 2023: 5217-5234 - 2022
- [j8]Yili Ren
, Zi Wang, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
GoPose: 3D Human Pose Estimation Using WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 69:1-69:25 (2022) - [j7]Zi Wang, Yili Ren
, Yingying Chen, Jie Yang:
ToothSonic: Earable Authentication via Acoustic Toothprint. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 78:1-78:24 (2022) - [j6]Sheng Tan
, Yili Ren
, Jie Yang
, Yingying Chen
:
Commodity WiFi Sensing in Ten Years: Status, Challenges, and Opportunities. IEEE Internet Things J. 9(18): 17832-17843 (2022) - [c15]Yili Ren
, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
Poster: A WiFi Vision-based Approach to Person Re-identification. CCS 2022: 3443-3445 - [c14]Zi Wang
, Yili Ren
, Yingying Chen
, Jie Yang
:
Excerpt of ToothSonic: Earable Authentication via Acoustic Toothprint. UbiComp/ISWC Adjunct 2022: 261-262 - [c13]Yichao Wang, Yili Ren
, Yingying Chen, Jie Yang:
A wifi vision-based 3D human mesh reconstruction. MobiCom 2022: 814-816 - [c12]Yili Ren
, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
Person re-identification using wifi signals. MobiCom 2022: 829-831 - [c11]Yili Ren
, Zi Wang, Beiyu Wang, Sheng Tan, Jie Yang:
Liquid level detection using wireless signals. MobiSys 2022: 521-522 - [c10]Yichao Wang, Yili Ren
, Yingying Chen, Jie Yang:
Wi-Mesh: A WiFi Vision-Based Approach for 3D Human Mesh Construction. SenSys 2022: 362-376 - [c9]Yili Ren
, Yichao Wang, Yingying Chen, Jie Yang:
A Vision-Based Approach for Commodity WiFi Sensing. SenSys 2022: 800-801 - [i4]Yili Ren
, Jie Yang:
3D Human Pose Estimation for Free-from and Moving Activities Using WiFi. CoRR abs/2204.07878 (2022) - [i3]Yili Ren
, Jie Yang:
Robust Person Identification: A WiFi Vision-based Approach. CoRR abs/2210.00127 (2022) - 2021
- [j5]Zi Wang, Sheng Tan, Linghan Zhang
, Yili Ren
, Zhi Wang, Jie Yang:
EarDynamic: An Ear Canal Deformation Based Continuous User Authentication Using In-Ear Wearables. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(1): 39:1-39:27 (2021) - [j4]Yili Ren
, Zi Wang, Sheng Tan, Yingying Chen, Jie Yang:
Winect: 3D Human Pose Tracking for Free-form Activity Using Commodity WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(4): 176:1-176:29 (2021) - [c8]Zi Wang, Yili Ren
, Yingying Chen, Jie Yang:
Earable Authentication via Acoustic Toothprint. CCS 2021: 2390-2392 - [c7]Yili Ren, Jia Liang, Siwu Luo:
Two extraction methods for carbonate rock oolites based on image segmentation algorithm. ICISCAE (IEEE) 2021: 137-141 - [c6]Yili Ren, Zi Wang, Sheng Tan, Yingying Chen, Jie Yang:
Tracking free-form activity using wifi signals. MobiCom 2021: 816-818 - [c5]Zi Wang, Sheng Tan, Linghan Zhang
, Yili Ren, Zhi Wang, Jie Yang:
An ear canal deformation based continuous user authentication using earables. MobiCom 2021: 819-821 - [c4]Yili Ren
, Zi Wang, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
3D Human Pose Estimation Using WiFi Signals. SenSys 2021: 363-364 - [i2]Yili Ren, Jie Yang:
Liquid Sensing Using WiFi Signals. CoRR abs/2106.10356 (2021) - [i1]Yili Ren, Jie Yang:
3D Human Pose Estimation for Free-form Activity Using WiFi Signals. CoRR abs/2110.08314 (2021) - 2020
- [j3]Yili Ren
, Sheng Tan, Linghan Zhang
, Zi Wang, Zhi Wang, Jie Yang:
Liquid Level Sensing Using Commodity WiFi in a Smart Home Environment. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(1): 24:1-24:30 (2020) - [c3]Linghan Zhang
, Sheng Tan, Zi Wang, Yili Ren
, Zhi Wang, Jie Yang:
VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment. ACSAC 2020: 884-896
2010 – 2019
- 2017
- [j2]Xiling Luo, Yili Ren
, Jiankun Hu
, Qianhong Wu, Jungang Lou
:
Privacy-preserving identity-based file sharing in smart city. Pers. Ubiquitous Comput. 21(5): 923-936 (2017) - 2016
- [c2]Xiling Luo, Yili Ren
, Jingwen Liu, Jiankun Hu
, Weiran Liu, Zhen Wang, Wei Xu, Qianhong Wu:
Identity-Based Group Encryption. ACISP (2) 2016: 87-102 - [c1]Yili Ren
, Xiling Luo, Qianhong Wu, Joseph K. Liu, Peng Zhang:
Towards Certificate-Based Group Encryption. ProvSec 2016: 296-305 - 2011
- [j1]Junjie Wu, Jian Chen, Yili Ren:
GIS enabled service site selection: Environmental analysis and beyond. Inf. Syst. Frontiers 13(3): 337-348 (2011)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint