MOBICOM 2018
Blinded by the Light: AR, VR, and Vision
Paper Name Author(s)
Battery-Free Eye Tracker On Glasses Tianxing Li, Xia Zhou
Conductive Inkjet Printed Passive 2D TrackPad For VR Interaction

Mobile virtual reality (VR) headsets barely support any user interaction. In this paper, the authors design Inkput, a simple passive interface attached to the unexploited backside of the headset to enable touch sensing.

Chuhan Gao, Xinyu Zhang, Suman Banerjee
Flare: Practical Viewport-Adaptive 360-Degree Video Streaming For Mobile Devices

Flare is a practical system for streaming 360° videos on commodity mobile devices. The authors conduct an IRB-approved user study where the authors collect head movement traces from 130 diverse users to gain insights on how to design the viewport prediction mechanism for Flare.

Feng Qian, Bo Han, Qingyang Xiao, Vijay Gopalakrishnan
NestDNN: Resource-Aware Multi-Tenant On-Device Deep Learning For Continuous Mobile Vision

Mobile vision systems usually run multiple applications concurrently and their available resources at runtime are dynamic. In this paper, the authors present NestDNN, a framework that takes the dynamics of runtime resources into account to enable resourceaware multi-tenant on-device deep learning for mobile vision systems.

Biyi Fang, Xiao Zeng, Mi Zhang
DeepCache: Principled Cache For Mobile Deep Vision

the authors present DeepCache, a principled cache design for deep learning inference in continuous mobile vision.

Mengwei Xu, Mengze Zhu, Yunxin Liu, Felix Xiaozhu Lin, Xuanzhe Liu
Living on the Edge: Mobile Systems at the Network's Edge
Paper Name Author(s)
FoggyCache: Cross-Device Approximate Computation Reuse

Mobile and IoT scenarios increasingly involve interactive and computation intensive contextual recognition. In this paper, the authors propose cross-device approximate computation reuse, which minimizes redundant computation .

Peizhen Guo, Bo Hu, Rui Li, Wenjun Hu
SkyCore: Moving Core To The Edge For Untethered And Reliable UAV-based LTE Networks Mehrdad Moradi, Karthik Sundaresan, Eugene Chai, Sampath Rangarajan, Z. Morley Mao
SWAN: Stitched Wi-Fi ANtennas

This paper presents the authors' experience in designing, implementing, testing, and applying a general-purpose antenna extension solution with commodity Wi-Fi.

Yaxiong Xie, Yanbo Zhang, Jansen Christian Liando, Mo Li
Surface MIMO: Using Conductive Surfaces For MIMO Between Small Devices

As connected devices continue to decrease in size, the authors explore the idea of leveraging everyday surfaces such as tabletops and walls to augment the wireless capabilities of devices. Specifically, the authors introduce Surface MIMO, a technique that enables MIMO communication betthe authorsen small devices via surfaces coated with conductive paint or covered with conductive cloth.

Justin Chan, Anran Wang, Vikram Iyer, and Shyamnath Gollakota
Lock it Down! Security, Countermeasures, and Authentication
Paper Name Author(s)
EchoPrint: Two-factor Authentication Using Vision And Acoustics On Smartphones Bing Zhou, Jay Lohokare, Ruipeng Gao, Fan Ye
Ghostbuster: Detecting The Presence Of Hidden Eavesdroppers

This paper explores the possibility of detecting the hidden presence of wireless eavesdroppers. The authors design and build Ghostbuster, the first device that can reliably extract this leakage, in order to detect the hidden presence of eavesdroppers.

Anadi Chaman, Jiaming Wang, Jiachen Sun, Haitham Hassanieh, Romit Roy Choudhury
Body-Guided Communications: A Low-Power, Highly-Confined Primitive To Track And Secure Every Touch

The growing number of devices we interact with require a convenient yet secure solution for user identification, authorization and authentication. In this paper, the authors propose a body-guided communication mechanism to secure every touch when users interact with a variety of devices and objects.

Viet Nguyen and Mohamed Ibrahim, Hoang Truong and Phuc Nguyen, Marco Gruteser, Tam Vu, Richard Howard
CEIVE: Combating Caller ID Spoofing On 4G Mobile Phones Via Callee-Only Inference And Verification

Caller ID spoofing forges the authentic caller identity, thus making the call appear to originate from another user. In this paper, the authors propose Ceive (Callee-only inference and verification), an effective and practical defense against caller ID spoofing.

Haotian Deng, Weicheng Wang, Chunyi Peng
Towards Replay-resilient RFID Authentication

The authors provide the first solution to an important question, “how a physical-layer authentication method can defend against signal replay attacks”. This paper presents Hu-Fu, the first physical layer RFID authentication protocol that is resilient to the major attacks.

Ge Wang, Haofan Cai, Chen Qian, Jinsong Han, Xin Li, Han Ding, Jizhong Zhao
Proximity-Proof: Secure And Usable Mobile Two-Factor Authentication

Current mobile two-factor authentication (2FA) solutions all require some form of user effort which may seriously affect the experience of mobile users. In this paper, the authors propose ProximityProof, a secure and usable mobile 2FA system without involving user interactions.

Dianqi Han, Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, Terri Hedgpeth
Multi-Modal and Cross-Technology Communications
Paper Name Author(s)
ChromaCode: A Fully Imperceptible Screen-Camera Communication System

this paper studies Hidden screen-camera communication techniques . In this paper, the authors present the design and implementation of ChromaCode, a screen-camera communication system that achieves all three goals simultaneously.

Kai Zhang, Chenshu Wu, Chaofan Yang, Yi Zhao, Kehong Huang, Chunyi Peng, Yunhao Liu, Zheng Yang
VSkin: Sensing Touch Gestures On Surfaces Of Mobile Devices Using Acoustic Signals

Enabling touch gesture sensing on all surfaces of the mobile device, not limited to the touchscreen area, leads to new user interaction experiences. In this paper, the authors propose VSkin, a system that supports fine-grained gesture-sensing on the back of mobile devices based on acoustic signals.

Ke Sun, Ting Zhao, Wei Wang, Lei Xie
Simultaneous Localization And Mapping With Power Network Electromagnetic Field Chris Xiaoxuan Lu, Yang Li, Peijun Zhao, Changhao Chen, Linhai Xie, Hongkai Wen, Rui Tan, Niki Trigoni
Cross-Frequency Communication: Near-Field Identification Of UHF RFIDs With WiFi!

Recent advances in Cross-Technology Communication (CTC) have improved eficient cooperation among heterogeneous wireless devices. The authors design and implement TiFi with commodity WiFi chipsets (e.g., Broadcom BCM43xx, Murata KM6D280 40, and Qualcomm WCN3990).

Zhenlin An, Lei Yang, Qiongzheng Lin
Achieving Receiver-Side Cross-Technology Communication With Cross-Decoding Wenchao Jiang, Song Min Kim, Zhijun Li, Tian He
Running on Empty: Backscatter and Low-Power Systems
Paper Name Author(s)
Challenge: RFID Hacking For Fun And Profit

this paper studies Passive radio frequency identification (RFID) tags. This paper shows how even hobbyists can transform commodity RFID tags into sensors by physically altering ('hacking') them using COTS sensors, a pair of scissors, and clear adhesive tape.

Ju Wang, Omid Abari, Srinivasan Keshav
Parallel Backscatter In The Wild: When Burstiness And Randomness Play With You

Parallel backscatter is a promising technique for high throughput, low pothe authorsr communications. this paper disclose the superclustering phenomenon, which invalidates that assumption and seriously afects the decoding performance.

Meng Jin, Yuan He, Xin Meng, Dingyi Fang, Xiaojiang Chen
Experience: Cross-Technology Radio Respiratory Monitoring Performance Study

This paper addresses the performance of systems which use commercial wireless devices to make bistatic RF channel measurements for non-contact respiration sensing. In this paper, the authors deploy an extensive real-world comparative human subject study.

Peter Hillyard, Anh Luong, Alemayehu Solomon Abrar, Neal Patwari, Krishna Sundar, Robert Farney, and Jason Burch, Christina A. Porucznik, Sarah Pollard
X-Tandem: Towards Multi-hop Backscatter Using Commodity WiFi

Backscatter communication ofers a cost- and energy-efficient means for IoT sensor data exchange. This paper presents X-Tandem, a multi-hop backscatter system that works with commodity WiFi devices.

Jia Zhao, Wei Gong, Jiangchuan Liu
Slice, Schedule, Repeat: 5G Cellular Networks
Paper Name Author(s)
Resolving Policy Conflicts In Multi-Carrier Cellular Access

in this paper, the authors study the important, yet largely unexplored, problem of inter-carrier switching for multi-carrier access.

Zengwen Yuan, Qianru Li, Yuanjie Li, Songwu Lu, Chunyi Peng, George Varghese
ECHO: A Reliable Distributed Cellular Core Network For Hyper-scale Public Clouds

One area with little progress in Economies of scale associated with hyper-scale public cloud platforms is cellular core networks. In this paper the authors present a novel cellular core network architecture, called ECHO1, where the availability guarantees might be an order of magnitude worse compared to existing (redundant) hardware platforms.

Binh Nguyen, Tian Zhang, Bozidar Radunovic, Ryan Stutsman, Thomas Karagiannis, Jakub Kocur, Jacobus Van der Merwe
Experience: Implications Of Roaming In Europe

“Roam like Home” is the initiative of the European Commission (EC) to end the levy of extra charges when roaming within the European region. This paper provides an in-depth characterization of the implications of international data roaming within Europe.

Anna Maria Mandalari, Andra Lutu, Ana Custura, Ali Safari, Ozgu Alay, Marcelo Bagnulo, Vaibhav Bajpai, Anna Brunstrom, Joerg Ott, Marco Mellia, Gorry Fairhurst
How Should I Slice My Network? A Multi-service Empirical Evaluation Of Resource Sharing Efficiency

this paper studies network slicing. In this paper, the authors provide a first investigation of trade-of via an empirical study of resource management efifciency in network slicing.

Cristina Marquez, Marco Gramaglia, Marco Fiore, Albert Banchs, Xavier Costa-Perez
GPF: A GPU-based Design To Achieve ~100 Us Scheduling For 5G NR

a set of diferent OFDM numerologies has been defined in the standards body in 5G New Radio(NR). In this paper, the authors present the design of GPF - a GPU-based proportional fair (PF) scheduler that can meet the ∼100 µ s time requirement.

Yan Huang, Shaoran Li, Y. Thomas Hou, and Wenjing Lou
Take Me Back to School: Learning and Sensing
Paper Name Author(s)
Towards Environment Independent Device Free Human Activity Recognition

the authors propose EI, a deep-learning based device free activity recognition framework that can remove the environment and subject specific information contained in the activity data and extract environment/subject-independent features shared by the data collected on different subjects under different environments.

Wenjun Jiang, Chenglin Miao, Fenglong Ma, Shuochao Yao, Yaqing Wang, Ye Yuan, Hongfei Xue, Chen Song, Xin Ma, Dimitrios Koutsonikolas, Wenyao Xu, Lu Su
CrossSense: Towards Cross-Site And Large-Scale WiFi Sensing

The authors present CrossSense, a novel system for scaling up WiFi sensing to new environments and larger problems.

Jie Zhang, Zhanyong Tang, Meng Li, Dingyi Fang, Petteri Nurmi, Zheng Wang
We are the Engineers: Mobile Systems and Networking
Paper Name Author(s)
Mitigating The Latency-Accuracy Trade-off In Mobile Data Analytics Systems

An increasing amount of mobile analytics is performed on data that is procured in a real-time fashion to make real-time decisions. the authors present CellScope, a system that applies a domain specific formulation and application of Multi-task Learning (MTL) to RAN performance analysis.

Anand Padmanabha Iyer, Li Erran Li, Mosharaf Chowdhury, Ion Stoica
One Billion Apples' Secret Sauce: Recipe For The Apple Wireless Direct Link Ad Hoc Protocol

Apple Wireless Direct Link (AWDL) is a proprietary and undocumented IEEE 802.11-based ad hoc protocol. In this paper, the authors present the operation of the protocol as the result of binary and runtime analysis.

Milan Stute, David Kreitschmann, Matthias Hollick
Experience: Android Resists Liberation From Its Primary Use Case

Network connectivity is often one of the most challenging aspects of deploying sensors. the authors find that a device designed for multi-tenant operation and frequent human interaction becomes unreliable when tasked to continuously run a single application with no human interaction, a somewhat counter-intuitive result.

Noah Klugman, Veronica Jacome, Meghan Clark, Matthew Podolsky, Patrick Pannuto, Neal Jackson, Aley Soud Nassor, Catherine Wolfram and Duncan Callaway, Jay Taneja, Prabal Dutta
RAVEN: Improving Interactive Latency For The Connected Car

Increasingly, vehicles sold today are connected cars.The authors study the connection quality available to connected cars today, focusing on user-facing, latency-sensitive applications.

HyunJong Lee, Jason Flinn, Basavaraj Tonshal
What's the Frequency, Kenneth? Millimeter-Wave Networks
Paper Name Author(s)
Multi-Stream Beam-Training For MmWave MIMO Networks

In this paper, the authors present MUlti-stream beam-Training for mm-wavE networks (MUTE) a novel system that leverages channel sparsity, GHz-scale sampling rate, and the knowledge of mm-Wave RF codebook beam patterns to construct a set of candidate beams for multi-stream beam steering.

Yasaman Ghasempour, Muhammad Kumail Haider, Carlos Cordeiro, Dimitrios Koutsonikolas, Edward Knightly
Adaptive Codebook Optimization For Beam-Training On Off-The-Shelf IEEE 802.11ad Devices

Beamforming is vital to overcome the high attenuation in wireless millimeter-wave networks. In this paper, the authors adaptively adjust the sector codebook of IEEE 802.11ad devices to optimize the transmit beam patterns for the current channel.

Joan Palacios, Daniel Steinmetzer, Adrian Loch, Matthias Hollick, Joerg Widmer
Towards Scalable And Ubiquitous Millimeter-Wave Wireless Networks

This paper studies Millimeter-wave (mmWave) . the authors design and implement UbiG - a mmWave wireless access network - that can deliver ubiquitous gigabits per second wireless access consistently to the commercial-of-the-shelf IEEE 802.11ad devices.

Sanjib Sur, Ioannis Pefkianakis, Xinyu Zhang, Kyu-Han Kim
LiSteer: MmWave Beam Acquisition And Steering By Tracking Indicator LEDs On Wireless APs

The authors present LiSteer, a novel system that steers mmWave beams at mobile devices by repurposing indicator LEDs on wireless Access Points (APs) to passively acquire direction estimates using off-the-shelf light sensors.

Muhammad Kumail Haider, Yasaman Ghasempour, Dimitrios Koutsonikolas, Edward Knightly
Where are U Now? Localization and Motion Tracking
Paper Name Author(s)
Verification: Accuracy Evaluation Of WiFi Fine Time Measurements On An Open Platform

Academic and industry research has argued for supporting WiFi time-of-flight measurements to improve WiFi localization. This paper introduces an open platform for experimenting with fine time measurements and a general, repeatable, and accurate measurement framework for evaluating time-based ranging systems.

Mohamed Ibrahim, Hansi Liu, Minitha Jawahar, Viet Nguyen, Marco Gruteser, and Richard Howard, Bo Yu and Fan Bai
Closing The Gaps In Inertial Motion Tracking

A rich body of work has focused on motion tracking techniques using inertial sensors. The authors design MUSE, a magnetometer-centric sensor fusion algorithm for orientation tracking.

Sheng Shen, Romit Roy Choudhury, Mahanth Gowda
RainbowLight: Single Light 3D Localization Made Practical In Today’s Buildings Lingkun Li, Pengjin Xie, Jiliang Wang