Author of the publication

SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity.

, , , , and . ACM Trans. Sens. Networks, 17 (2): 19:1-19:22 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative study of the biases of MUSIC-like estimators., and . Signal Process., 50 (1-2): 39-55 (1996)ACMNet: Adaptive Confidence Matching Network for Human Behavior Analysis via Cross-modal Retrieval., , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 16 (1s): 27:1-27:21 (2020)A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices., , , , and . IEEE Trans. Mob. Comput., 21 (4): 1155-1171 (2022)Toward Pitch-Insensitive Speaker Verification via Soundfield., , , , , and . IEEE Internet Things J., 11 (1): 1175-1189 (January 2024)MC2: Multimode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring., , , , and . ACM Trans. Sens. Networks, 10 (3): 52:1-52:30 (2014)Design of two MUSIC-like estimators based on bias minimization., and . IEEE Trans. Signal Process., 44 (9): 2284-2299 (1996)Lightweight secure communication protocols for in-vehicle sensor networks., , , and . CyCAR@CCS, page 19-30. ACM, (2013)Which One to Go: Security and Usability Evaluation of Mid-Air Gestures., , , , , , and . CoRR, (2018)Determining sink location through Zeroing-In attackers in wireless sensor networks., and . Wirel. Networks, 18 (3): 335-349 (2012)Regional Patterns and Vulnerability Analysis of Chinese Web Passwords., , , and . IEEE Trans. Inf. Forensics Secur., 11 (2): 258-272 (2016)