Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WiFi-Enabled User Authentication through Deep Learning in Daily Activities., , , and . ACM Trans. Internet Things, 2 (2): 13:1-13:25 (2021)Joint Resource Allocations for Remote Radio Head Deployments with Coherent Transmitter., , , and . EURASIP J. Wireless Comm. and Networking, (2012)Cross-Layer Design for Interference-Limited Spectrum Sharing Systems with Heterogeneous QoS., , , and . GLOBECOM, page 1-5. IEEE, (2011)Demo: Device-free Activity Monitoring Through Real-time Analysis on Prevalent WiFi Signals., , , , , , and . DySPAN, page 1-2. IEEE, (2019)DSTN sleep transistor sizing with a new approach to estimate the maximum instantaneous current., , and . ISCAS, page 3717-3720. IEEE, (2010)Approximation algorithms for inventory problems with submodular or routing costs., and . Math. Program., 160 (1-2): 225-244 (2016)Computing in cirrus clouds: the challenge of intermittent connectivity., , , and . MCC@SIGCOMM, page 23-28. ACM, (2012)Few-shot Sentiment Analysis Based on Adaptive Prompt Learning and Contrastive Learning., , , , , , and . Inf. Technol. Control., 52 (4): 1058-1072 (December 2023)WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity., , , , and . CoRR, (2020)Quadratic neural networks for solving inverse problems., , and . CoRR, (2024)