Author of the publication

Implement of a secure selective ultrasonic microphone jammer.

, , , , , , and . CCF Trans. Pervasive Comput. Interact., 3 (4): 367-377 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive tabu search algorithm embedded with iterated local search and route elimination for the bike repositioning and recycling problem., , , , and . Comput. Oper. Res., (2020)Learn to Threshold: ThresholdNet With Confidence-Guided Manifold Mixup for Polyp Segmentation., , , and . IEEE Trans. Medical Imaging, 40 (4): 1134-1146 (2021)A Method for Interval Prediction of Satellite Battery State of Health Based on Sample Entropy., , , and . IEEE Access, (2019)Multi-Objective Configuration Optimization for Isolated Microgrid With Shiftable Loads and Mobile Energy Storage., , , and . IEEE Access, (2019)A multi-objective co-evolutionary algorithm for energy-efficient scheduling on a green data center., , , , and . Comput. Oper. Res., (2016)Assessment and Prediction of Impact of Flight Configuration Factors on UAS-Based Photogrammetric Survey Accuracy., , and . Remote. Sens., 14 (16): 4119 (2022)Exploring the Interactions between Target Positive and Negative Information for Acoustic Echo Cancellation., , , , and . CoRR, (2023)Implement of a secure selective ultrasonic microphone jammer., , , , , , and . CCF Trans. Pervasive Comput. Interact., 3 (4): 367-377 (2021)Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3144-3157 (July 2023)Layer Allocation Algorithms in Layered Peer-to-Peer Streaming., , and . NPC, volume 3222 of Lecture Notes in Computer Science, page 167-174. Springer, (2004)