Tao Gu

Tao Gu
Macquarie University · Department of Computing

Professor

About

54
Publications
6,750
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
389
Citations
Introduction
I am currently a Professor in Department of Computing at Macquarie University, Sydney. I obtained my Ph.D. in Computer Science from National University of Singapore, M.Sc. in Electrical and Electronic Engineering from Nanyang Technological University, and B.Eng. in Automatic Control from Huazhong University of Science and Technology.
Education
February 2002 - September 2005
National University of Singapore
Field of study
  • Computer Science

Publications

Publications (54)
Article
Pattern lock-based authentication has been widely adopted in modern smartphones. However, this scheme relies essentially on passwords, making it vulnerable to various side-channel attacks such as the smudge attack and the shoulder-surfing attack. In this paper, we propose a second-factor authentication system named SwipePass, which authenticates a...
Conference Paper
Full-text available
Recent efforts in reducing user involvement during device pairing have successfully introduced touch-to-access. To detect whether two devices are being held by the same person, existing touch-to-access solutions extract features from a shared information source to generate pairing keys. They focus on validating the device's authenticity by only req...
Article
Gait rehabilitation is a common method of postoperative recovery after the user sustains an injury or disability. However, traditional gait rehabilitations are usually performed under the supervision of rehabilitation specialists, which implies that the patients cannot receive adequate gait assessment anytime and anywhere. In this article, we propo...
Article
Full-text available
In order to deeply analyze the performance of Electromagnetic Field (EMF) on wireless sensor Signal Processing (SP), this paper first examines the influencing factors of wireless sensor SP performance based on the relevant theories of EMF and wireless sensor. Then, it discusses the influence of EMF on wireless sensor information Transmission and Re...
Article
Mobile and wearable devices have become more and more popular. However, the tiny touch screen leads to inefficient interaction with these devices, especially for text input. In this paper, we propose DynaKey, which allows people to type on a virtual keyboard printed on a piece of paper or drawn on a desk, for inputting text into a head-mounted came...
Article
Similar to cloud servers, edge servers running 24/7 in a mobile edge computing (MEC) system consume a large amount of energy, and thus require demand response management. Demand response has been widely employed to reduce energy consumption at data centers. However, existing demand response approaches for data centers are rendered obsolete by the n...
Article
Personal mobile sensing is fast permeating our daily lives to enable activity monitoring, healthcare and rehabilitation. Combined with deep learning, these applications have achieved significant success in recent years. Different from conventional cloud-based paradigms, running deep learning on devices offers several advantages including data priva...
Article
Inattentive driving is one of the high-risk factors that causes a large number of traffic accidents every year. In this paper, we aim to detect driver inattention leveraging on large-scale vehicle trajectory data while at the same time explore how do these inattentive events affect driver behaviors and what following reactions they may cause, espec...
Article
With the increasing relevance of the Internet of Things and large-scale location-based services, LoRa localization has been attractive due to its low-cost, low-power, and long-range properties. However, existing localization approaches based on received signal strength indicators are either easily affected by signal fading of different land-cover t...
Conference Paper
With the rapid development of the Internet of Things (IoT), we have seen a larger number of devices deployed with different wireless communication protocols (i.e., WiFi, ZigBee, Bluetooth). Working in the same place opens a new opportunity for these devices to communicate directly with each other, leveraging on Cross-technology Communication (CTC)....
Article
Mobile Deep Learning (MDL) has emerged as a privacy-preserving learning paradigm for mobile devices. This paradigm offers unique features such as privacy preservation, continual learning and low-latency inference to the building of personal mobile sensing applications. However, squeezing Deep Learning to mobile devices is extremely challenging due...
Article
Long-range (LoRa) is an attractive low-power wide-area networks (LPWANs) technology for its features of low power, long range and support for concurrent transmission. Our study reveals LoRa concurrent transmission suffer from the mismatch between sender’s reception (RX) and gateway’s transmission (TX) window, which leads to the decline of goodput e...
Article
Edge Computing, extending cloud computing, has emerged as a prospective computing paradigm. It allows a SaaS (Software-as-a-Service) vendor to allocate its users to nearby edge servers to minimize network latency and energy consumption on their devices. From the SaaS vendor's perspective, a cost-effective SaaS user allocation (SUA) aims to allocate...
Chapter
For solving the two-level inventory optimization model of precious repairable spare parts, an improved differential evolution algorithm is proposed to solve the model in view of the shortcomings of the traditional marginal analysis method. The difference between the worst solution and the best solution of the algorithm is 1.93% after 30 runs, the s...
Preprint
We envisage future context-aware applications will dynamically adapt their behaviors to various context data from sources in wide-area networks, such as the Internet. Facing the changing context and the sheer number of context sources, a data management system that supports effective source organization and efficient data lookup becomes crucial to...
Preprint
Full-text available
Energy efficiency has proven to be an important factor dominating the working period of WSN surveillance systems. Intensive studies have been done to provide energy efficient power management mechanisms. In this paper, we present PAS, a Prediction-based Adaptive Sleeping mechanism for environment monitoring sensor networks to conserve energy. PAS f...
Preprint
Full-text available
Conference and social events provides an opportunity for people to interact and develop formal contacts with various groups of individuals. In this paper, we propose an efficient interaction mechanism in a pervasive computing environment that provide recommendation to users of suitable locations within a conference or expo hall to meet and interact...
Article
Full-text available
Aiming at the low quality of the solution obtained with the traditional marginal analysis algorithm for solving multi‐level inventory optimisation problem of repairable spare parts, a hybrid algorithm integrating particle swarm optimisation, marginal analysis algorithm‐METRIC model and tabu search is proposed. In the early stage of the hybrid algor...
Preprint
Full-text available
Personal mobile sensing is fast permeating our daily lives to enable activity monitoring, healthcare and rehabilitation. Combined with deep learning, these applications have achieved significant success in recent years. Different from conventional cloud-based paradigms, running deep learning on devices offers several advantages including data priva...
Conference Paper
Full-text available
Voice control has attracted extensive attention recently as it is a prospective User Interface (UI) to substitute for conventional touch control on smart devices. Voice assistants have become increasingly popular in our daily lives, especially for those people who are visually impaired. However, the inherently insecure nature of voice biometrics me...
Article
Recognizing in-air hand gestures will benefit a wide range of applications such as sign-language recognition, remote control with hand gestures, and “writing” in the air as a new way of text input. This article presents AirContour, which focuses on in-air writing gesture recognition with a wrist-worn device. We propose a novel contour-based gesture...
Article
Sensing coverage has attracted considerable attention in wireless sensor networks. Existing work focuses mainly on the 0/1 disk model which provides only coarse approximation to real scenarios. In this article, we study the connected target coverage problem which concerns both coverage and connectivity. We use directional probabilistic sensors, and...
Article
Full-text available
The widespread use of smartphones has brought great convenience to our daily lives, while at the same time we have been increasingly exposed to security threats. Keystroke security is essential to user privacy protection. In this paper, we present GazeRevealer, a novel side-channel based keystroke inference framework to infer sensitive inputs on sm...
Preprint
Full-text available
We propose the first privacy preserving search technique for stego health data in untrusted cloud in this paper. The Cloud computing is a popular technology to the healthcare providers for outsourcing health data due to flexibility and cost effectiveness. However, outsourcing health data to the cloud introduces serious privacy issues to the patient...
Conference Paper
Full-text available
The widespread use of smartphones has brought great convenience to our daily lives, while at the same time we have been increasingly exposed to security threats. Keystroke security is an essential element in user privacy protection. In this paper, we present GazeRe-vealer, a novel side-channel based keystroke inference framework to infer sensitive...
Article
Full-text available
Human respiration detection based on Wi-Fi signals does not require users to carry any device, hence it has drawn a lot of attention due to better user acceptance and great potential for real-world deployment. However, recent studies show that respiration sensing performance varies in different locations due to the nature of Wi-Fi radio wave propag...
Article
Full-text available
The on-street parking system is an indispensable part of civil projects, which provides travellers and shoppers with parking spaces. With the recent in-ground sensors deployed throughout the city, there is a significant problem on how to use the sensor data to manage parking violations and issue infringement notices in a short time-window efficient...
Article
Classical remote desktop systems are considered for a single host, thus hindering their applicability on virtualization environment. Remote desktop virtualization is rising in the recent years as a new advanced extension to virtualization technology. However, existing remote desktop virtualization solutions introduce weak performance in relation to...
Article
In this paper, we investigate the problem of energy balanced data collection in wireless sensor networks, aiming to balance energy consumption among all sensor nodes during the data propagation process. Energy balanced data collection can potentially save energy consumption and prolong network lifetime, and hence it has many practical implications...
Conference Paper
It is still challenging in telecommunication (telco) industry to accurately locate mobile devices (MDs) at city-scale using the measurement report (MR) data, which measure parameters of radio signal strengths when MDs connect with base stations (BSs) in telco networks for making/receiving calls or mobile broadband (MBB) services. In this paper, we...
Conference Paper
Smartphone based personal tracking is very important for people to find their destination in large complex buildings (e.g. shopping malls, airports and museums). Such applications are highly demanded in both industries and research organizations. One critical issue for these applications is lack of mature technologies for highly accurate indoor loc...
Conference Paper
Privacy has become a key concern for smartphone users as many apps tend to access and share sensitive data. However, it is not easily understandable for users which apps access what type of data and which are the minimal access permissions required to achieve a certain functionality. Although there are apps targeting privacy concerns, they only sho...
Book
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Homes and Health Telematics, ICOST 2014, held in Denver, CO, USA in June 2014. The 21 revised full papers presented together with three keynote papers and 9 short papers were carefully reviewed and selected from numerous submissi...
Article
Rete algorithm is the mainstream of the algorithm in the rules engine; it provides efficient local entities data and rules pattern matching method. But Rete algorithm applied in rules engine has defects in performance and demand aspect, this paper applies three methods to improve the Rete algorithm in the rule engine: rule decomposition, Alpha-Node...
Conference Paper
In this paper, we propose two RFID identification and authentication schemes based on the previously proposed triggered hash chain scheme by Henrici and Muller. The schemes are designed to mitigate the shortcomings observed in the triggered hash chain scheme and to ensure privacy preserving identification, tag-reader mutual authentication, as well...
Article
Full-text available
Energy efficiency has proven to be a dominating factor for the lifetime of WSN surveillance systems. Intensive studies have been done to provide energy efficient power management mechanisms, but few directly address the issues specifically for the sensor networks that monitoring Diffusion Stimulus (DS), a scenario that is the most common for enviro...
Conference Paper
Full-text available
This paper presents the design of a Kindred-based QoS-aware Live Media Streaming (KQStream) system in heterogeneous peer-to-peer environments. Motivated by the Multiple Description Coding technique, we propose a novel kindred-based approach to construct a peer-to-peer overlay topology. To achieve QoS-awareness during the streaming process, we propo...
Conference Paper
Full-text available
Energy efficiency has proven to be an important factor dominating the working period of WSN surveillance systems. Intensive studies have been done to provide energy efficient power management mechanisms. In this paper, we present PAS, a Prediction-based Adaptive Sleeping mechanism for environment monitoring sensor networks to conserve energy. PAS f...
Article
Smart spaces augment people's lives with ubiquitous computing technology that provides increased communications, awareness, and functionality. However, smart spaces pose many technical challenges in device interaction/integration, user/environment perception, system interoperability and scalability, as well as security/privacy/trust. In this paper,...
Article
Smart spaces augment people's lives with ubiquitous computing technology that provides increased communications, awareness, and functionality. However, smart spaces pose many technical challenges in device interaction/integration, user/environment perception, system interoperability and scalability, as well as security/privacy/trust. In this paper,...

Network

Cited By

Projects

Project (1)