Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Bikemate: Bike Riding Behavior Monitoring With Smartphones, Weixi Gu, Zimu Zhou, Yuxun Zhou, Han Zou, Yunxin Liu, Costas J. Spanos, Lin Zhang Nov 2017

Bikemate: Bike Riding Behavior Monitoring With Smartphones, Weixi Gu, Zimu Zhou, Yuxun Zhou, Han Zou, Yunxin Liu, Costas J. Spanos, Lin Zhang

Research Collection School Of Computing and Information Systems

Detecting dangerous riding behaviors is of great importance to improve bicycling safety. Existing bike safety precautionary measures rely on dedicated infrastructures that incur high installation costs. In this work, we propose BikeMate, a ubiquitous bicycling behavior monitoring system with smartphones. BikeMate invokes smartphone sensors to infer dangerous riding behaviors including lane weaving, standing pedalling and wrong-way riding. For easy adoption, BikeMate leverages transfer learning to reduce the overhead of training models for different users, and applies crowdsourcing to infer legal riding directions without prior knowledge. Experiments with 12 participants show that BikeMate achieves an overall accuracy of 86.8% for lane …


Sugarmate: Non-Intrusive Blood Glucose Monitoring With Smartphones, Weixi Gu, Yuxun Zhou, Zimu Zhou, Xi Liu, Han Zou, Pei Zhang, Costas J. Spanos, Lin Zhang Sep 2017

Sugarmate: Non-Intrusive Blood Glucose Monitoring With Smartphones, Weixi Gu, Yuxun Zhou, Zimu Zhou, Xi Liu, Han Zou, Pei Zhang, Costas J. Spanos, Lin Zhang

Research Collection School Of Computing and Information Systems

Inferring abnormal glucose events such as hyperglycemia and hypoglycemia is crucial for the health of both diabetic patients and non-diabetic people. However, regular blood glucose monitoring can be invasive and inconvenient in everyday life. We present SugarMate, a first smartphone-based blood glucose inference system as a temporary alternative to continuous blood glucose monitors (CGM) when they are uncomfortable or inconvenient to wear. In addition to the records of food, drug and insulin intake, it leverages smartphone sensors to measure physical activities and sleep quality automatically. Provided with the imbalanced and often limited measurements, a challenge of SugarMate is the inference …


Mopeye: Opportunistic Monitoring Of Per-App Mobile Network Performance, Daoyuan Wu, Rocky K. C. Chang, Weichao Li, Eric K. T. Cheng, Debin Gao Jul 2017

Mopeye: Opportunistic Monitoring Of Per-App Mobile Network Performance, Daoyuan Wu, Rocky K. C. Chang, Weichao Li, Eric K. T. Cheng, Debin Gao

Research Collection School Of Computing and Information Systems

Crowdsourcing mobile user’s network performance has become an effective way of understanding and improving mobile network performance and user quality-of-experience. However, the current measurement method is still based on the landline measurement paradigm in which a measurement app measures the path to fixed (measurement or web) servers. In this work, we introduce a new paradigm of measuring per-app mobile network performance. We design and implement MopEye, an Android app to measure network round-trip delay for each app whenever there is app traffic. This opportunistic measurement can be conducted automatically without user intervention. Therefore, it can facilitate a large-scale and long-term …


Inferring Smartphone Keypress Via Smartwatch Inertial Sensing, Sougata Sen, Karan Grover, Vigneshwaran Subbaraju, Archan Misra Apr 2017

Inferring Smartphone Keypress Via Smartwatch Inertial Sensing, Sougata Sen, Karan Grover, Vigneshwaran Subbaraju, Archan Misra

Research Collection School Of Computing and Information Systems

Due to numerous benefits, sensor-rich smartwatchesand wrist-worn wearable devices are quickly gaining popularity.The popularity of these devices also raises privacy concerns. Inthis paper we explore one such privacy concern: the possibility ofextracting the location of a user’s touch-event on a smartphone,using the inertial sensor data of a smartwatch worn by the useron the same arm. This is a major concern not only because itmight be possible for an attacker to extract private and sensitiveinformation from the inputs provided but also because the attackmode utilises a device (smartwatch) that is distinct from thedevice being attacked (smartphone). Through a user study wefind …