Tao Gu

Tao Gu
RMIT University | RMIT · School of Computer Science and Information Technology

About

163
Publications
32,288
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,367
Citations

Publications

Publications (163)
Article
Acoustic sensing has been explored in numerous applications leveraging the wide deployment of acoustic-enabled devices. However, most of the existing acoustic sensing systems work in a very short range only due to fast attenuation of ultrasonic signals, hindering their real-world deployment. In this paper, we present a novel acoustic sensing system...
Article
The ubiquity of Wi-Fi infrastructure has facilitated the development of a range of Wi-Fi based sensing applications. Wi-Fi sensing relies on weak signal reflections from the human target and thus only supports a limited sensing range, which significantly hinders the real-world deployment of the proposed sensing systems. To extend the sensing range,...
Article
This paper presents the design and implementation of PCube, a phase-based parallel packet decoder for concurrent transmissions of LoRa nodes. The key enabling technology behind PCube is a novel air-channel phase measurement technique which is able to extract phase differences of air-channels between LoRa nodes and multiple antennas of a gateway. PC...
Article
Floor plan construction has been one of the key techniques in many important applications such as indoor navigation, location-based services, and emergency rescue. Existing floor plan construction methods require expensive dedicated hardware (e.g., Lidar or depth camera), and may not work in low-visibility environments (e.g., smoke, fog or dust). I...
Article
This paper presents LiteNap which improves the energy efficiency of LoRa by enabling LoRa nodes to operate in a downclocked 'light sleep' mode for packet reception. A fundamental limit that prevents radio downclocking is the Nyquist sampling theorem which demands the clock-rate being at least twice the bandwidth of LoRa chirps. Our study reveals un...
Article
Many IoT applications have the requirements of conducting complex IoT events processing (e.g., speech recognition) that are hardly supported by low-end IoT devices due to limited resources. Most existing approaches enable complex IoT event processing on low-end IoT devices by statically allocating tasks to the edge or the cloud. In this article, we...
Article
Sleep monitoring is essential to people’s health and well-being, which can also assist in the diagnosis and treatment of sleep disorder. Compared with contact-based solutions, contactless sleep monitoring does not attach any device to the human body, hence it has attracted increasing attention in recent years. Inspired by the recent advances in Wi-...
Article
Recent years have witnessed a trend of monitoring human respiration using Channel State Information (CSI) retrieved from commodity WiFi devices. Existing approaches essentially leverage signal propagation in a Line-of-Sight (LoS) setting to achieve good performance. However, in real-life environments, LoS can be easily blocked by furniture, home ap...
Article
Network simulation is a fundamental service for performance testing and protocol design in wireless networks. Due to the wireless dynamics, it is highly challenging to provide repeatable and reliable simulation results that are comparable to the empirical experimental results. To achieve repeatability for simulation, the existing works focus on rep...
Article
LoRa has emerged as a promising Low-Power Wide Area Network (LP-WAN) technology to connect a huge number of Internet-of-Things (IoT) devices. The dense deployment and an increasing number of IoT devices lead to intense collisions due to uncoordinated transmissions. However, the current MAC/PHY design of LoRaWAN fails to recover collisions, resultin...
Article
Biometric authentication involves various technologies to identify individuals by exploiting their unique, measurable physiological and behavioral characteristics. However, traditional biometric authentication systems (e.g., face recognition, iris, retina, voice, and fingerprint) are at increasing risks of being tricked by biometric tools such as a...
Article
Full-text available
This paper explores the possibility of tracking finger drawings in the air leveraging WiFi signals from commodity devices. Prior solutions typically require user to hold a wireless transmitter, or need proprietary wireless hardware. They can only recognize a small set of pre-defined hand gestures. This paper introduces FingerDraw, the first sub-wav...
Preprint
Elderly care is one of the many applications supported by real-time activity recognition systems. Traditional approaches use cameras, body sensor networks, or radio patterns from various sources for activity recognition. However, these approaches are limited due to ease-of-use, coverage, or privacy preserving issues. In this paper, we present a nov...
Preprint
Traditional fingerprint based localization techniques mainly rely on infrastructure support such as RFID, Wi-Fi or GPS. They operate by war-driving the entire space which is both time-consuming and labor-intensive. In this paper, we present MLoc, a novel infrastructure-free localization system to locate mobile users in a metro line. It does not rel...
Preprint
Context information has emerged as an important resource to enable autonomy and flexibility of pervasive applications. The widespread use of context information necessitates efficient wide-area lookup services. In this paper, we present the design and implementation of a peer-to-peer context lookup system to support contextaware applications over m...
Preprint
In this paper, we propose a hierarchical semantic overlay network for searching heterogeneous data over wide-area networks. In this system, data are represented as RDF triples based on ontologies. Peers that have the same semantics are organized into a semantic cluster, and the semantic clusters are self-organized into a one-dimensional ring space...
Preprint
Computing becomes increasingly mobile and pervasive today; these changes imply that applications and services must be aware of and adapt to their changing contexts in highly dynamic environments. Today, building context-aware systems is a complex task due to lack of an appropriate infrastructure support in intelligent environments. A context-aware...
Conference Paper
LoRa has emerged as a promising Low-Power Wide Area Network (LP-WAN) technology to connect a huge number of Internet-of-Things (IoT) devices. The dense deployment and an increasing number of IoT devices lead to intense collisions due to uncoordinated transmissions. However, the current MAC/PHY design of LoRaWAN fails to recover collisions, resultin...
Article
Full-text available
This paper analyzes the packet transmission cost in asynchronous heterogeneous duty-cycled wireless sensor network systems (WSNs). We discover limitations of conventional opportunistic routing protocols when they are applied to asynchronous heterogeneous duty-cycled WSNs. The key reason is that the conventional opportunistic routing protocols overl...
Article
Full-text available
This paper presents the design and implementation of a Location data collecting system only using the barometer sensor on the smartphone. It is energy efficient because of using low-power barometer sensor readings to infer the location, and it protects user privacy by providing the non-sensitive location data. To design such a location data collect...
Article
Full-text available
Heterogeneous Bistatic Radars (BR) have different sensing ranges and couplings of sensing regions, which provide more flexible coverage for the boundary at complex terrain such as across rivers and valleys. Due to the Cassini oval sensing region of a BR and the coupling of sensing regions among different BRs, the coverage problem of BR sensor netwo...
Conference Paper
Many IoT applications have the requirements of conducting complex IoT events processing (e.g., speech recognition) which are hardly supported by low-end IoT devices due to limited resources. Most existing approaches enable complex IoT event processing on low-end IoT devices by statically allocating tasks to the edge or the cloud. In this paper, we...
Article
Full-text available
In recent years, wireless sensing has been exploited as a promising research direction for contactless human activity recognition. However, one major issue hindering the real deployment of these systems is that the signal variation patterns induced by the human activities with different devices and environmental settings are neither stable nor cons...
Article
This paper identifies two energy saving opportunities of Wi-Fi interface emerged during smartphone's screen-off periods. Exploiting the opportunities, we propose a new power saving strategy, BackPSM, for screen-off Wi-Fi communications. BackPSM regulates client to send and receive packets in batches and coordinates multiple clients to communicate a...
Article
Full-text available
Forget your smartphone in the car again? This happens often in our daily lives, sometimes even makes troubles. In this paper, we present SMinder, an effective, low power approach to remind user take the phone when getting off the car. Based on the context awareness techniques in mobile sensing, we detect the situation of forgetting to take the phon...
Article
Full-text available
Perimeter barriers can provide intrusion detection for a closed area. It is efficient for practical applications, such as coastal shoreline monitoring and international boundary surveillance. Perimeter barrier coverage construction in some regions of interest with irregular boundaries can be represented by its minimum circumcircle and every point o...
Article
This work proposes a novel three-dimensional model to represent users’ mental workload when using smartphone applications. We validate this model by studying the factors’ perceptual independence and interactions using data collected from 22 participants. By analyzing the correlations between the factors of mental workload and tap strength captured...
Article
Light-to-Camera Communications (LCC) have emerged as a new wireless communication technology with great potential to benefit a broad range of applications. However, the existing LCC systems either require cameras directly facing to the lights or can only communicate over a single link, resulting in low throughputs and being fragile to ambient illum...
Article
Full-text available
This paper presents the design and implementation of BTrack, a new approach for location tracking on mountain roads. It is as accurate as the GPS on common smartphones, but costs much less energy. To design such a location system, we carried out a nation-wide online survey to confirm the desirability for low power location tracking system, and the...
Article
Cross-Technology Interference affects the operation of low-power ZigBee networks, especially under severe WiFi interference. Accurate corruption estimation is very important to improve the resilience of ZigBee transmissions. However, there are many limitations in existing approaches such as low accuracy, high overhead, and requirement of hardware m...
Article
Recent years have witnessed advances of Internet of Things (IoT) technologies and their applications to enable contactless sensing and elderly care in smart homes. Continuous and real-time respiration monitoring is one of the important applications to promote assistive living for elders during sleep and attracted wide attention in both academia and...
Article
Full-text available
Recent years have witnessed advances of Internet of Things (IoT) technologies and their applications to enable contactless sensing and elderly care in smart homes. Continuous and real-time respiration monitoring is one of the important applications to promote assistive living for elders during sleep and attracted wide attention in both academia and...
Conference Paper
Full-text available
Multimodal features play a key role in wearable sensor based human activity recognition (HAR). Selecting the most salient features adaptively is a promising way to maximize the effectiveness of multimodal sensor data. In this regard, we propose a "collect fully and select wisely" principle as well as an interpretable parallel recurrent model with c...
Article
Full-text available
The altitude of a moving user is important context information for mobile technologies and applications. However, with the increasing pervasiveness of smartphones and abundant mobile applications, developers and users have gradually discovered that the height is more useful than altitude in many situations. The height is often a relative value, whi...
Preprint
Full-text available
Multimodal features play a key role in wearable sensor-based human activity recognition (HAR). Selecting the most salient features adaptively is a promising way to maximize the effectiveness of multimodal sensor data. In this regard, we propose a "collect fully and select wisely" principle as well as an interpretable parallel recurrent model with c...
Article
This paper presents the design and implementation of the SpiderWalk system for circumstance-aware transportation activity detection using a novel contact vibration sensor. Different from existing systems that only report the type of activity, our system detects not only the activity but also its circumstances (e.g., road surface, vehicle, and shoe...
Article
Full-text available
We present FinDroidHR, a novel gesture input technique for off-the-shelf smartwatches. Our technique is designed to detect 10 hand gestures on the hand wearing a smartwatch. The technique is enabled by analysing features of the Photoplethysmography (PPG) signal that optical heart-rate sensors capture. In a study with 20 participants, we show that F...
Conference Paper
Full-text available
An electroencephalography (EEG) based Brain Computer Interface (BCI) enables people to communicate with the outside world by interpreting the EEG signals of their brains to interact with devices such as wheelchairs and intelligent robots. More specifically, motor imagery EEG (MI-EEG), which reflects a subject's active intent, has been attracting in...
Article
Light-to-Camera Communication (LCC) has emerged as a new wireless communication technology with great potential to benefit a broad range of applications. However, the existing LCC systems either require the camera directly facing to the lights or can only communicate over a single link, resulting in low throughputs and being fragile to ambient illu...
Article
Full-text available
Recent advances in ubiquitous sensing technologies have exploited various approaches to monitoring vital signs. One of the vital signs is human respiration which typically requires reliable monitoring with low error rate in practice. Previous works in respiration monitoring however either incur high cost or suffer from poor error rate. In this pape...
Article
Full-text available
Multimodal features play a key role in wearable sensor based Human Activity Recognition (HAR). Selecting the most salient features adaptively is a promising way to maximize the effectiveness of multimodal sensor data. In this regard, we propose a "collect fully and select wisely (Fullie and Wiselie)" principle as well as a dual-stream recurrent con...
Preprint
Full-text available
Multimodal features play a key role in wearable sensor based Human Activity Recognition (HAR). Selecting the most salient features adaptively is a promising way to maximize the effectiveness of multimodal sensor data. In this regard, we propose a "collect fully and select wisely (Fullie and Wiselie)" principle as well as a dual-stream recurrent con...
Article
Person identification technology recognizes individuals by exploiting their unique, measurable physiological and behavioral characteristics. However, the state-of-the-art person identification systems have been shown to be vulnerable, e.g., contact lenses can trick iris recognition and fingerprint films can deceive fingerprint sensors. EEG (Electro...
Preprint
Full-text available
Person identiication technology recognizes individuals by exploiting their unique, measurable physiological and behavioral characteristics. However, the state-of-the-art person identiication systems have been shown to be vulnerable, e.g., anti-surveillance prosthetic masks can thwart face recognition, contact lenses can trick iris recognition, voco...
Conference Paper
Full-text available
An electroencephalography (EEG) based brain activity recognition is a fundamental eld of study for a number of signiicant applications such as intention prediction, appliance control, and neurological disease diagnosis in smart home and smart healthcare domains. Existing techniques mostly focus on binary brain activity recognition for a single pers...
Conference Paper
An electroencephalography (EEG) based brain activity recognition is a fundamental field of study for a number of significant applications such as intention prediction, appliance control, and neurological disease diagnosis in smart home and smart healthcare domains. Existing techniques mostly focus on binary brain activity recognition for a single p...
Conference Paper
With the booming of the Internet of Things, enormous number of smart devices/sensors have been deployed in the physical world to monitor our surroundings. Usually those devices generate high-dimensional geo-tagged time-series data. However, these sensor readings are easily missing due to the hardware malfunction, connection errors or data corruptio...
Conference Paper
In this paper, we study the problem of pedestrian relative positioning with respect to their walking direction. Existing approaches are mainly based on trajectory information or device proximity detection, and they highly rely on infrastructure or specialized device support. Importantly, most work does not provide relative position information with...
Article
Hand gesture is becoming an increasingly popular means of interacting with consumer electronic devices, such as mobile phones, tablets and laptops. In this paper, we present AudioGest, a device-free gesture recognition system that can accurately sense the hand in-air movement around user's devices. Compared to the state-of-the-art, AudioGest is sup...
Conference Paper
Full-text available
Recent advances in ubiquitous sensing technologies have exploited various approaches to monitoring vital signs. One of the vital signs is human respiration which typically requires reliable monitoring with low error rate in practice. Previous works in respiration monitoring however either incur high cost or suffer from poor error rate. In this pape...
Article
An electroencephalography (EEG) based brain activity recognition is a fundamental field of study for a number of significant applications such as intention prediction, appliance control, and neurological disease diagnosis in smart home and smart healthcare domains. Existing techniques mostly focus on binary brain activity recognition for a single p...
Article
An electroencephalography (EEG) based Brain Computer Interface (BCI) enables people to communicate with the outside world by interpreting the EEG signals of their brains to interact with devices such as wheelchairs and intelligent robots. More specifically, motor imagery EEG (MI-EEG), which reflects a subjects active intent, is attracting increasin...
Article
Device-free human sensing is a key technology to support many applications such as indoor navigation and activity recognition. By exploiting WiFi signals reflected by human body, there have been many WiFi-based device-free human sensing applications. Among these applications, person identification is a fundamental technology to enable user-specific...
Article
Full-text available
This paper presents ScaPSM (i.e., Scalable Power-Saving Mode Scheduler), a design that enables scalable competing background traffic scheduling in crowd event 802.11 deployments with Power-Saving Mode (PSM) radio operation. ScaPSM prevents the packet delay proliferation of previous study, if applied in the crowd events scenario, by introducing a ne...
Article
This paper investigates the energy consumption minimization problem for wireless sensor networks running low-power listening (LPL) protocols in noisy environments. We observe that the energy consumption by false wakeups (i.e., wakeup without receiving any packet) of a node in noisy environments can be a dominant factor in many cases while the false...
Article
Full-text available
Biometric authentication involves various technologies to identify individuals by exploiting their unique, measurable physiological and behavioral characteristics. However, biometric authentication systems (e.g., face recognition, iris, retina, voice, and fingerprint) are increasingly facing the risk of being tricked by biometric tools such as anti...
Article
Full-text available
Understanding and recognizing human activities is a fundamental research topic for a wide range of important applications such as fall detection and remote health monitoring and intervention. Despite active research in human activity recognition over the past years, existing approaches based on computer vision or wearable sensor technologies presen...
Article
Traffic congestion is a major concern in many cities around the world. Previous work mainly focuses on the prediction of congestion and analysis of traffic flows, while the congestion correlation between road segments has not been studied yet. In this paper, we propose a three-phase framework to explore the congestion correlation between road segme...
Article
Elderly care is one of the many applications supported by real-time activity recognition systems. Traditional approaches use cameras, body sensor networks, or radio patterns from various sources for activity recognition. However, these approaches are limited due to ease-of-use, coverage, or privacy preserving issues. In this paper, we present a nov...
Article
Wireless sensor networks are shifting to application platforms that poses several challenges on reprogramming efficiency. To better support the efficient reprogramming, this paper proposes a systematic approach named ReLog which consists of a programming language, a compiler, and a virtual machine. To make application programs concise and easy to m...
Conference Paper
Smoking behavior detection has attracted much research interest for its significant impact on smokers' physical and mental health. Existing research has shown the potential of using wearable devices for fine-grained smoking puff and session detection by detecting a smoker's content of breathing, lighter usage, breathing, and gesture patterns. Howev...