Author of the publication

Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing.

, , , , , , and . INFOCOM, page 1-10. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheduling of mixed-criticality applications on resource-sharing multicore systems., , , and . EMSOFT, page 17:1-17:15. IEEE, (2013)Motion identification based on sEMG for flexible pneumatic hand rehabilitator., , , , , and . Industrial Robot, 42 (1): 25-35 (2015)CAUTS: Clock Tree Optimization via Skewed Cells With Complementary Asymmetrical Uniform Transistor Sizing., , , and . IEEE Trans. Very Large Scale Integr. Syst., 32 (1): 137-149 (January 2024)Adaptive Construction of the Virtual Debris Flow Disaster Environments Driven by Multilevel Visualization Task., , , , , , , , , and . ISPRS Int. J. Geo Inf., 8 (5): 209 (2019)Cost-effective SET-tolerant clock distribution network design by mitigating single event transient propagation., , , , and . Sci. China Inf. Sci., 60 (10): 108401:1-108401:3 (2017)Attention-based interpolation network for video deblurring., , , , and . Neurocomputing, (2021)A Study of Sentence-BERT Based Essay Off-topic Detection., , , , and . CNIOT, page 515-519. ACM, (2023)Feature Fusion Based on Sparse Block for Image Super-resolution., , , , and . IEEE BigData, page 3347-3354. IEEE, (2020)Self-calibrated Attention Residual Network for Image Super-Resolution., , , and . IEEE BigData, page 3325-3332. IEEE, (2020)Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing., , , , , , and . INFOCOM, page 1-10. IEEE, (2021)