Author of the publication

Covert Device Association Among Colluding Apps via Edge Processor Workload.

, , and . IEEE Internet Things J., 7 (11): 10763-10772 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic Video Segmentation Using Adaptive-K Gaussian Mixture Model., , , and . IWICPAS, volume 4153 of Lecture Notes in Computer Science, page 125-134. Springer, (2006)Special issue on neural computing and applications 2021., , , , , and . Neural Comput. Appl., 34 (19): 16169-16171 (2022)Identification of Rubber Plantations in Southwestern China Based on Multi-Source Remote Sensing Data and Phenology Windows., , , , , , and . Remote. Sens., 15 (5): 1228 (March 2023)Configuration-Adaptive Wireless Visual Sensing System With Deep Reinforcement Learning., , , , and . IEEE Trans. Mob. Comput., 22 (9): 5078-5091 (September 2023)Exploiting Reactive Mobility for Collaborative Target Detection in Wireless Sensor Networks., , , and . IEEE Trans. Mob. Comput., 9 (3): 317-332 (2010)An extended target signal integration method via mainlobe broadening., , , , , and . Signal Process., (March 2024)Mixed Numerology Interference Recognition Approach for 5G NR., , , , , , and . IEEE Wirel. Commun. Lett., 10 (10): 2135-2139 (2021)Covert Device Association Among Colluding Apps via Edge Processor Workload., , and . IEEE Internet Things J., 7 (11): 10763-10772 (2020)Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices., , , , , , , and . IEEE Internet Things J., 8 (3): 1817-1829 (2021)Vulnerability Analysis, Robustness Verification, and Mitigation Strategy for Machine Learning-Based Power System Stability Assessment Model Under Adversarial Examples., , , , , and . IEEE Trans. Smart Grid, 13 (2): 1622-1632 (2022)