Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers., , , and . HotMobile, page 99-104. ACM, (2016)Finger-writing with Smartwatch: A Case for Finger and Hand Gesture Recognition using Smartwatch., , and . HotMobile, page 9-14. ACM, (2015)A Survey of Network Design Problems and Joint Design Approaches in Wireless Mesh Networks., and . IEEE Commun. Surv. Tutorials, 13 (3): 396-428 (2011)On insider misbehavior detection in cognitive radio networks., , , and . IEEE Netw., 27 (3): 4-9 (2013)Using Centrality-Based Power Control for Hot-Spot Mitigation in Wireless Networks., and . GLOBECOM, page 1-6. IEEE, (2010)PCASA: Proximity Based Continuous and Secure Authentication of Personal Devices., , , , and . SECON, page 1-9. IEEE, (2017)FineHand: Learning Hand Shapes for American Sign Language Recognition., , , , and . FG, page 700-707. IEEE, (2020)Sensor-Assisted Codebook-Based Beamforming for Mobility Management in 60 GHz WLANs., , , and . MASS, page 333-341. IEEE Computer Society, (2015)On the feasibility of estimating soluble sugar content using millimeter-wave., , , , , , and . IoTDI, page 13-24. ACM, (2019)Poster Abstract: Human Tracking and Activity Monitoring Using 60 GHz mmWave., , , and . IPSN, page 25:1-25:2. IEEE, (2016)