Author of the publication

Blind Recognition of Touched Keys on Mobile Devices.

, , , , , and . ACM Conference on Computer and Communications Security, page 1403-1414. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Digital Marauder's Map: A WiFi Forensic Positioning Tool., , , , , and . IEEE Trans. Mob. Comput., 11 (3): 377-389 (2012)De-anonymizing and countermeasures in anonymous communication networks., , , , and . IEEE Commun. Mag., 53 (4): 60-66 (2015)Guest Editorial Special Issue on Security and Privacy in Cyber-Physical Systems., , , , , and . IEEE Internet Things J., 4 (6): 1798-1801 (2017)On Location Privacy-Preserving Online Double Auction for Electric Vehicles in Microgrids., , , , , and . IEEE Internet Things J., 6 (4): 5902-5915 (2019)Optimizing Aggregate Query Processing in Cloud Data Warehouses., , , , , and . Globe, volume 8648 of Lecture Notes in Computer Science, page 1-12. Springer, (2014)SODA: Strategy-Proof Online Double Auction Scheme for Multimicrogrids Bidding., , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 48 (7): 1177-1190 (2018)On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode., , , , , and . CoRR, (2019)Identifying mobiles hiding behind wireless routers., , , , and . INFOCOM, page 2651-2659. IEEE, (2011)Theory underlying measurement of AOA with a rotating directional antenna., , , , and . INFOCOM, page 2490-2498. IEEE, (2013)A Survey on Big Data Market: Pricing, Trading and Protection., , , , , and . IEEE Access, (2018)