Author of the publication

Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information

, , , , and . CoRR, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Twins: Device-free object tracking using passive tags., , , , , , , and . INFOCOM, page 469-476. IEEE, (2014)Organizing domain-specific information on the Web: An experiment on the Spanish business Web directory., , , , and . Int. J. Hum. Comput. Stud., 66 (2): 51-66 (2008)FedRich: Towards efficient federated learning for heterogeneous clients using heuristic scheduling., , , , , , and . Inf. Sci., (October 2023)Verifiable Smart Packaging with Passive RFID., , , , , , and . IEEE Trans. Mob. Comput., 18 (5): 1217-1230 (2019)Arbitrator2.0: Preventing Unauthorized Access on Passive Tags., , , , , , and . IEEE Trans. Mob. Comput., 21 (3): 835-848 (2022)A Fingertip Profiled RF Identifier., , , , , , and . IEEE Trans. Mob. Comput., 21 (1): 392-407 (2022)Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-based Speed Estimation., , , , , , and . CoRR, (2013)Cloud-Edge Collaboration-Based Local Voltage Control for DGs With Privacy Preservation., , , , , , , and . IEEE Trans. Ind. Informatics, 19 (1): 98-108 (2023)FeatureBooster: Boosting Feature Descriptors with a Lightweight Neural Network., , , , , and . CoRR, (2022)UFDA: Universal Federated Domain Adaptation with Practical Assumptions., , , , , , , and . CoRR, (2023)