Chenning Li

Chenning Li
  • Bachelor of Engineering
  • PhD Student at Massachusetts Institute of Technology

About

23
Publications
2,813
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
757
Citations
Introduction
Current institution
Massachusetts Institute of Technology
Current position
  • PhD Student

Publications

Publications (23)
Preprint
Full-text available
Flow-level simulation is widely used to model large-scale data center networks due to its scalability. Unlike packet-level simulators that model individual packets, flow-level simulators abstract traffic as continuous flows with dynamically assigned transmission rates. While this abstraction enables orders-of-magnitude speedup, it is inaccurate by...
Article
Passive human tracking using Wi-Fi has been researched broadly in the past decade. Besides straight-forward anchor point localization, velocity is another vital sign adopted by the existing approaches to infer user trajectory. However, state-of-the-art Wi-Fi velocity estimation relies on Doppler-Frequency-Shift (DFS) which suffers from the inevitab...
Article
The blockchain technology, initially created for cryptocurrency, has been re-purposed for recording state transitions of smart contracts — decentralized applications that can be invoked through external transactions. Smart contracts gained popularity and accrued hundreds of billions of dollars in market capitalization in recent years. Unfortunately...
Preprint
The blockchain technology has been used for recording state transitions of smart contracts - decentralized applications that can be invoked through external transactions. Smart contracts gained popularity and accrued hundreds of billions of dollars in market capitalization in recent years. Unfortunately, like all other programs, smart contracts are...
Article
Full-text available
Low-Power Wide-Area Networks (LPWANs) has emerged as a promising mechanism to connect billions of low-cost Internet of Things (IoT) devices for wide-area data collection. Long Range (LoRa) [1] is a commercialized and widely deployed wireless technology that facilitates the establishment of LPWANs. As illustrated in Figure 1, a LoRaWAN consists of e...
Preprint
Full-text available
Passive human tracking via Wi-Fi has been researched broadly in the past decade. Besides straight-forward anchor point localization, velocity is another vital sign adopted by the existing approaches to infer user trajectory. However, state-of-the-art Wi-Fi velocity estimation relies on Doppler-Frequency-Shift (DFS) which suffers from the inevitable...
Preprint
Full-text available
In this paper, we propose NEC (Neural Enhanced Cancellation), a defense mechanism, which prevents unauthorized microphones from capturing a target speaker's voice. Compared with the existing scrambling-based audio cancellation approaches, NEC can selectively remove a target speaker's voice from a mixed speech without causing interference to others....
Article
Low-Power Wide-Area Networks (LPWANs) are an emerging Internet-of-Things (IoT) paradigm, which caters to large-scale and long-term sensory data collection demand. Among the commercialized LPWAN technologies, LoRa (Long Range) attracts much interest from academia and industry due to its open-source physical (PHY) layer and standardized networking st...
Preprint
LoRaWAN has emerged as an appealing technology to connect IoT devices but it functions without explicit coordination among transmitters, which can lead to many packet collisions as the network scales. State-of-the-art work proposes various approaches to deal with these collisions, but most functions only in high signal-to-interference ratio (SIR) c...
Article
Full-text available
With the development of the Internet of Things (IoT), many kinds of wireless signals (e.g., Wi-Fi, LoRa, RFID) are filling our living and working spaces nowadays. Beyond communication, wireless signals can sense the status of surrounding objects, known as wireless sensing , with their reflection, scattering, and refraction while propagating in spac...
Article
Full-text available
User identified gesture recognition is a fundamental step towards ubiquitous WiFi based sensing. We propose WiHF, which first simultaneously enables cross-domain gesture recognition and user identification using commodity WiFi in a real-time manner. The basic idea of WiHF is to derive a domain-independent motion change pattern of arm gestures from...

Network

Cited By