Kang G. Shin

Kang G. Shin
University of Michigan | U-M · Department of Electrical Engineering and Computer Science (EECS)

About

251
Publications
16,932
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,659
Citations
Citations since 2016
82 Research Items
3013 Citations
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500

Publications

Publications (251)
Article
As the number of subscribers in wireless communication systems grows rapidly, it has become important to design efficient medium access control (MAC) protocols to realize resources sharing among multiple users. When designing a MAC, effective management of co-channel interference (CCI) among multiple concurrent transmissions is critical to enhancin...
Article
A new in-vehicle phone localization scheme, called DAPL (Detection and Alarming of in-vehicle Phone Location), is proposed to determine the locations of smartphones inside a moving car, with the goal of preventing smartphone-distracted driving. DAPL operates on commodity smartphones and cars, and does not require additional special/dedicated hardwa...
Article
Vehicles' mobility causes frequent beam misalignments in millimeter wave (mmWave) vehicle-to-infrastructure (V2I) communications. In 5G systems, beam sweeping is done repeatedly to track a vehicle's mobility and maintain high-quality beam selection. Despite extensive studies on mmWave communications, there are still insufficient discussions on when...
Article
Wireless networks are usually deployed to cover more overlapping areas, experiencing severe interferences and hence making interference management essential for their viability. Interference alignment (IA) is an effective way of interference management and has thus received significant attention. With IA, at least one degree-of-freedom (DoF) should...
Preprint
Hardware flaws are permanent and potent: hardware cannot be patched once fabricated, and any flaws may undermine any software executing on top. Consequently, verification time dominates implementation time. The gold standard in hardware Design Verification (DV) is concentrated at two extremes: random dynamic verification and formal verification. Bo...
Article
Full-text available
Small cell base stations (SBSs) are being developed as a way of expanding the coverage of cellular networks. However, the power consumption of small cell networks has become an acute problem. To mitigate this problem, we propose a new power-saving scheme based on coordinate multi-point (CoMP) transmission for densely deployed small cell networks. T...
Article
Due to their sparsity, 60GHz channels are characterized by a few dominant paths. Knowing the angular information of their dominant paths, we can develop various applications, such as the prediction of link performance and the tracking of 802.11ad devices. Although they are equipped with phased arrays, the angular inference for 802.11ad devices is s...
Article
With the continually increasing demand for higher data rate and link density as well as better network coverage, wireless networks, including 5G-enabled vehicular communication network (VCN), will be designed/deployed to cover more overlapping areas, experiencing more severe interferences. As a result, interference becomes a key impediment to the i...
Conference Paper
Thanks to recent progresses in mobile payment, IoT, electric motors, batteries and location-based services, Dockless E-scooter Sharing (DES) has become a popular means of last-mile commute for a growing number of (smart) cities. As e-scooters are getting deployed dynamically and flexibly across city regions that expand and/or shrink, with subsequen...
Article
EMERALDS (Extensible Microkernel for Embedded, ReALtime, Distributed Systems) is a real-time microkernel designed for small-memory embedded applications. These applications must run on slow (15--25MHz) processors with just 32--128 kbytes of memory, either to keep production costs down in mass-produced systems or to keep weight and power consumption...
Article
Internet of things (IoT) is a new paradigm that involves the interconnection of thousands of devices and home appliances. Due to the scarcity of the spectrum suitable for wireless electromagnetic transmission, many communication systems and devices are close to each other, or even overlapping in spectrum, thus incurring complicated interference sit...
Preprint
Full-text available
We consider resource allocation (RA) in multi-carrier coordinated multi-point (CoMP) systems with limited feedback, in which a cluster of base stations (BSs), each equipped with multiple antennas, are connect to each other and/or a central processor via backhauls/fronthauls. The main objective of coordinated RA is to select user equipments (UEs) on...
Preprint
Due to their sparsity, 60GHz channels are characterized by a few dominant paths. Knowing the angular information of their dominant paths, we can develop various applications, such as the prediction of link performance and the tracking of an 802.11ad device. Although they are equipped with phased arrays, the angular inference for 802.11ad devices is...
Preprint
The transistors used to construct Integrated Circuits (ICs) continue to shrink. While this shrinkage improves performance and density, it also reduces trust: the price to build leading-edge fabrication facilities has skyrocketed, forcing even nation states to outsource the fabrication of high-performance ICs. Outsourcing fabrication presents a secu...
Preprint
Since the inception of the integrated circuit (IC), the size of the transistors used to construct them continually shrink. While this advancement significantly improves computing capability, the associated massive complexity forces IC designers to outsource fabrication. Outsourcing presents a security threat: comprehensive post-fabrication inspecti...
Article
The performance of multiple-input multiple-output (MIMO) multiplexing heterogenous cellular networks are often analyzed using a single-exponent path-loss model. Thus, the effect of the expected line-of-sight (LOS) propagation in densified settings is unaccounted for, leading to inaccurate performance evaluation and/or inefficient system design. Thi...
Conference Paper
A smart shelving system can visualize stock data in real time by leveraging item-level RFID tagging so that we can minimize out-of-stock and reduce warehousing and labor costs. The key issue of smart shelving is to locate RFID tags at any time, especially after misplacing tags. The detection of misplaced tags on stationary shelved items is very cha...
Conference Paper
A smart shelving system can visualize stock data in real time by leveraging item-level RFID tagging. The detection of misplaced tags on stationary shelved items is very challenging due to position ambiguity, phase wrapping, device diversity, and phase ambiguity. We propose an effective way of detecting misplaced tags, called FINDS, that requires ne...
Conference Paper
People use their mobile devices anywhere and anytime to run various apps, and the information shown on their device screens can be seen by nearby (unauthorized) parties, called shoulder surfers. To mitigate this privacy threat, we have developed HideScreen by utilizing the human vision and optical system properties to hide the users' on-screen info...
Conference Paper
The information displayed on mobile device screens can be seen by nearby (unauthorized) parties, called shoulder surfers. To protect sensitive on-screen information, we have developed HideScreen by utilizing the human vision and optical system properties to hide the users' on-screen information from the shoulder surfers. Specifically, HideScreen di...
Conference Paper
Full-text available
With the rapid development of wireless communication technologies, the demand for higher data rate and more concurrent transmissions has been continually increasing. Due to the widespread deployment of various wireless technologies, interference has become a key roadblock to the improvement of network performance. Interference has long been known t...
Article
With the rapid development of wireless communication technologies, interference has become a main impediment to network performance, making interference management (IM) a critical issue. Interference steering (IS) is emerging as a novel way of IM, which can steer the spatial feature of interference to a target subspace by exploiting the interaction...
Article
Both interference alignment (IA) and interference neutralization (IN) are exploited for Coordinated Multi-Point (CoMP) communications. With the base station’s (BS’s) cooperation, a transmit precoder and a receive filter are designed jointly, and concurrent transmissions of multiple data streams are then enabled. In the design of precoder, IN is app...
Article
The Controller Area Network (CAN) is being widely used in real-time control applications such as automobiles, aircraft, and automated factories. In this paper we present the mixed traffic scheduler (MTS) for CAN, which provides higher schedulability than fixed-priority schemes like deadlinemonotonic (DM) while incurring less overhead than dynamic e...
Preprint
Full-text available
Providing seamless coverage under current cellular network technologies is surmountable only through gross overengineering. Alternatively, as an economically effective solution, the use of unmanned aerial vehicles (UAVs), augmented with the functionalities of terrestrial base stations (BSs), is recently advocated. In this paper we investigate the e...
Preprint
Full-text available
Analysis of the performance of Unmanned Aerial Vehicle (UAV)-enabled communications systems often relies upon idealized antenna characteristic, where the side-lobe gain of UAVs' antenna is ignored. In practice, however, side-lobe cause inevitable interference to the ground users. We investigate the impact of UAVs' antenna side-lobe on the performan...
Preprint
Full-text available
We consider an unmanned aerial vehicle enabled (UAV-enabled) fog-radio access network (F-RAN) in which UAVs are considered as flying remote radio heads (RRH) equipped with caching and cooperative communications capabilities. We are mainly focus on probabilistic/randomized content placement strategy, and accordingly formulate the content placement a...
Article
Worst-case-based timing verification for the controller area network (CAN) has been the bottleneck to efficient use of its bandwidth. Especially, this inefficiency comes from the worst-case transmission error rate (WCTER) when transmission errors are accounted for. To alleviate this inefficiency, we propose a runtime adaptation scheme, error-adapti...
Article
Due to the hierarchical structure and heterogeneity of most deployed wireless networks, multiple data transmissions using the same communication resource, such as same frequency band and time slot, are likely to occur in the same area. Hence, interference becomes critical to the decoding of interfered signals. There have already been numerous techn...
Preprint
Full-text available
Caching the content closer to the user equipments (UEs) in heterogenous cellular networks (HetNets) improves user-perceived Quality-of-Service (QoS) while lowering the operators backhaul usage/costs. Nevertheless, under the current networking strategy that promotes aggressive densification, it is unclear whether cache-enabled HetNets preserve the c...
Conference Paper
Full-text available
Thanks to their great success as a green urban transportation means of first/last-mile connectivity, bike sharing service (BSS) networks has been proliferating all over the globe. Their station (re)placement and dock resizing has thus become an increasingly important problem for bike sharing service providers. In contrast to the use of conventional...
Article
Cache-enabled network architecture has great potential for enhancing the efficiency of content distribution as well as reducing the network congestion. This, in turn, has called for joint optimization of traffic engineering and caching strategies while considering both network congestion and content demands. In this paper, we present a distributed...
Article
We find that the conventional belief of vehicle cyber attacks and their defenses---attacks are feasible and thus defenses are required only when the vehicle's ignition is turned on---does not hold. We verify this fact by discovering and applying two new practical and important attacks: battery-drain and Denial-of-Body-control (DoB). The former can...
Article
Full-text available
With the development of diverse wireless communication technologies, interference has become a key impediment in network performance, thus making effective interference management (IM) essential to accommodate a rapidly increasing number of subscribers with diverse services. Although there have been numerous IM schemes proposed thus far, none of th...
Article
Full-text available
Geomagnetism has recently attracted considerable attention for indoor localization due to its pervasiveness and independence from extra infrastructure. Its location signature has been observed to be temporally stable and spatially discernible for localization purposes. This survey examines and analyzes the recent challenges and advances in geomagne...
Conference Paper
Various defense schemes --- which determine the presence of an attack on the in-vehicle network --- have recently been proposed. However, they fail to identify which Electronic Control Unit (ECU) actually mounted the attack. Clearly, pinpointing the attacker ECU is essential for fast/efficient forensic, isolation, security patch, etc. To meet this...
Article
As vehicle maneuver data becomes abundant for assisted or autonomous driving, their implication of privacy invasion/leakage has become an increasing concern. In particular, the surface for fingerprinting a driver will expand significantly if the driver's identity can be linked with the data collected from his mobile or wearable devices which are wi...
Article
Full-text available
Most of current research on the coverage performance of multi-stream MIMO heterogeneous networks (HetNets) has been focusing on a single data-stream. This does not always provide accurate results as our analysis shows the cross-stream correlation due to interference can greatly affect the coverage performance. This paper analyzes the coverage proba...
Article
Full-text available
Coverage evaluation of heterogeneous multi-tier cellular networks (HetNets) is often based on simplifying assumptions on cell association (CA): the resource required by, and practical limitations of pilot measurements are overlooked. Also, the base station (BS) providing the strongest signal-to-interference ratio among all BSs is always the serving...
Article
Texting or browsing web on a smartphone while driving is one of the most distracting activities that significantly increase the risk of car accidents. There have been a number of proposals for the prevention of distracted driving, but none of them has addressed its important challenges completely and effectively. To remedy this deficiency, we prese...
Article
The new 802.11ac standard aims at achieving Gbps data throughput for individual users by exploiting enhanced physical-layer features, such as higher modulation levels, MIMO (Multiple Input Multiple Output), and wider bandwidths. However, the heterogeneity of bandwidth in a network can cause asymmetric interferences in which certain transmissions ca...
Conference Paper
Full-text available
Interference management (IM) is essential to wireless communication networks, but interference suppression, a key component of IM, is known to degrade users' achievable spectral efficiency (SE). It is thus important to select an appropriate IM method with optimal operating parameters according to diverse network deployments, transmit power differen...
Conference Paper
Driverless and/or environment-friendly cars have recently received a great deal of attention from media and almost all industry and government sectors due mainly to their great potential impacts on safety, economy, and environments. In particular, enabling vehicles to communicate with one another via wireless devices holds the potential to automate...
Article
Full-text available
We study the coverage performance of multiantenna (MIMO) communications in heterogenous networks (HetNets). Our main focus is on open-loop and multi-stream MIMO zero-forcing beamforming (ZFBF) at the receiver. Network coverage is evaluated adopting tools from stochastic geometry. Besides fixed-rate transmission (FRT), we also consider adaptive-rate...
Conference Paper
In Android, communications between apps and system services are supported by a transaction-based Inter-Process Communication (IPC) mechanism. Binder, as the cornerstone of this IPC mechanism, separates two communicating parties as client and server. As with any client-server model, the server should not make any assumption on the validity (sanity)...
Article
An Adaptive tranSmission mechanism exploiting both interference loCality and the relationship between dEsired sigNal and inTerference (ASCENT) is proposed for uplink transmission in heterogeneous networks. The authors adopt both X channel and Z channel models according to which spatial signal processing is designed. In the X channel, the picocell b...
Article
To meet the diverse traffic demands of different applications, emerging WLAN standards have been incorporating a variety of channel widths ranging from 5 to 160 MHz. The coexistence of variable-width channels imposes a new challenge to the 802.11 protocols, since the 802.11 MAC is agnostic of, and thus incapable of, adapting to the PHY-layer spectr...
Article
By allowing two nearby mobile devices to communicate via a direct link between them, device-to-device (D2D) communications can efficiently increase the capacity of D2D underlaid cellular networks in which D2D and cellular communications share the same frequency band. However, the coexistence of D2D and cellular communications in the same frequency...
Conference Paper
Contemporary vehicles are getting equipped with an increasing number of Electronic Control Units (ECUs) and wireless connectivities. Although these have enhanced vehicle safety and efficiency, they are accompanied with new vulnerabilities. In this paper, we unveil a new important vulnerability applicable to several in-vehicle networks including Con...
Conference Paper
ForcePhone is a novel system that enables commodity phones to recognize the force applied to their touch screen and body. Researchers have shown the usefulness and importance of this expressive input interface (especially for the one-hand operation), but this advanced function has not yet been realized and deployed in most state-of-the-art smartpho...
Conference Paper
This paper analyzes the host cache effectiveness in full virtualization, particularly associated with journaling of guests. We observe that the journal access of guests degrades cache performance largely due to the write-once access pattern and the frequent sync operations. To remedy this problem, we design and implement a novel caching policy, cal...
Article
Despite the rapidly increasing number of public WiFi hotspots, their coverage is still limited to indoor and office/business environments. WiFi tethering is thus a useful and economic means of providing on-the-go mobile users' Internet connection. One of the main problems of WiFi tethering is the excessive power consumption of mobile access points...
Article
In Android, communications between apps and system services are supported by a transaction-based Inter-Process Communication (IPC) mechanism. Binder, as the cornerstone of this IPC mechanism, separates two communicating parties as client and server. As with any client-server model, the server should not make any assumption on the validity (sanity)...
Conference Paper
Full-text available
Both interference alignment (IA) and interference neutralization (IN) are exploited for Coordinated Multi-Point (CoMP) transmissions. With the base station's cooperation, transmit precoder and receive filter are designed jointly, and then concurrent transmissions of multiple data streams are achieved. In the design of preprocessing, IN is applied t...
Conference Paper
Full-text available
Due to the hierarchical structure and heterogeneity of most deployed wireless networks, multiple data transmissions using the same communication resource, such as frequency band and time slot, are likely to occur in the same area. Hence, interference becomes critical to the decoding of interfered signals. There have already been numerous techniques...
Article
The design of mixed-criticality systems is often subject to mandatory certification and has been drawing considerable attention over the past few years. This letter studies fixed-priority scheduling of mixed-criticality systems on a uniprocessor platform but in a more general way, using different priority orderings in different execution phases and...
Article
Wireless charging is a promising way to solve the energy constraint problem in sensor networks. While extensive efforts have been made to improve the performance of charging and communication in wireless rechargeable sensor networks (WRSNs), little has been done to address the operation scheduling problem. To fill this void, we propose a joint ener...
Article
Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio networks. Intelligent malicious users (IMUs) adjust their malicious behaviors according to their objectives and the network’s defense schemes. Without long-term collection of information on users’ reputation, the existing schemes fail to thwart such ma...
Conference Paper
Although GPS has become a standard component of smartphones, providing accurate navigation during the last portion of a trip remains an important but unsolved problem. Despite extensive research on localization, the limited resolution of a map imposes restrictions on the navigation engine in both indoor and outdoor environments. To bridge the gap b...
Conference Paper
We propose a novel mobile system, called EchoTag, that enables phones to tag and remember indoor locations without requiring any additional sensors or pre-installed infrastructure. The main idea behind EchoTag is to actively generate acoustic signatures by transmitting a sound signal with a phone's speakers and sensing its reflections with the phon...
Article
Full-text available
Linear classification has demonstrated suc-cess in many areas of applications. Modern algorithms for linear classification can train reasonably good models while going through the data in only tens of rounds. However, large data often does not fit in the memory of a single machine, which makes the bottleneck in large-scale learning the disk I/O, no...
Conference Paper
Full-text available
A scheduling algorithm based on weighted users' correlation and fairness (WUCFS) is proposed for MU-MIMO downlink broadcast channels (BC), to address the problem that traditional fairness scheduling algorithms cannot handle, i.e., they cannot accurately compute the achievable rate for each user in their iterative user selection process, thus creati...
Article
Full-text available
In future, a massive number of devices are expected to communicate for pervasive monitoring and measurement, industrial automation, and home/building energy management. Nevertheless, such Machine-to-Machine (M2M) communications are prone to failure due to depletion of machines energy if the communication system is not designed properly. A key step...
Article
Cardinality estimation is of fundamental importance in various wireless communication applications. The performance of any adaptive medium access control in the uplink channel is in fact affected by its accuracy. This paper provides a fresh look at this fundamental problem, and proposes a novel scheme for fast and accurate cardinality estimation. T...
Conference Paper
Full-text available
In this paper we investigate single-hop multicast transmission in which randomly located multiple transmitters multicast packets to a cluster of receivers. Packet retransmission is known as a promising mechanism for improving the transmission reliability. Our focus is on evaluating (i) the minimum required delay (retransmission attempts), τ * , for...
Conference Paper
Detecting how a vehicle is steered and then alarming drivers in real time is of utmost importance to the vehicle and the driver's safety, since fatal accidents are often caused by dan- gerous steering. Existing solutions for detecting dangerous maneuvers are implemented either in only high-end vehicles or on smartphones as mobile applications. Howe...
Article
Cooperative relay aims to realize the capacity of multi-antenna arrays in a distributed manner. However, the symbol-level synchronization requirement among distributed relays limits its use in practice. We propose to circumvent this barrier with a cross-layer protocol called Distributed Asynchronous Cooperation (DAC). With DAC, multiple relays can...
Article
This paper considers radio resource allocation (RRA) in the downlink of an orthogonal frequency division multiple access (OFDM)-based spectrum-sharing network. The objective of RRA is to maximize the average achievable throughput subject to the primary service interference threshold and the secondary service transmit power constraint. RRA is usuall...
Article
Live migration of virtual machines (VMs) can consume excessive time and resources, and may affect application performance significantly if VM memory pages get dirtied faster than their content can be transferred to the destination. Existing approaches to this problem transfer memory content faster with high-speed networks, slow down the dirtying of...