From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Pervasive Wireless Environments: Detecting and Localizing User Spoofing, , , и . Springer Briefs in Computer Science Springer, (2014)HyperEar: Indoor Remote Object Finding with a Single Phone., , , , и . ICDCS, стр. 678-687. IEEE, (2019)Gate-based Bidirectional Interactive Decoding Network for Scene Text Recognition., , , и . CIKM, стр. 2273-2276. ACM, (2019)Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT., , , и . MobiHoc, стр. 5:1-5:10. ACM, (2017)ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks., , , и . INFOCOM, стр. 675-683. IEEE, (2009)ER: Early recognition of inattentive driving leveraging audio devices on smartphones., , , , , , и . INFOCOM, стр. 1-9. IEEE, (2017)Fine-grained sleep monitoring: Hearing your breathing with smartphones., , , и . INFOCOM, стр. 1194-1202. IEEE, (2015)Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks., , , и . INFOCOM, стр. 927-935. IEEE, (2012)A first look at inter-data center traffic characteristics via Yahoo! datasets., , , , и . INFOCOM, стр. 1620-1628. IEEE, (2011)Accurate rogue access point localization leveraging fine-grained channel information., , , и . CNS, стр. 211-219. IEEE, (2014)