Author of the publication

Implement of a secure selective ultrasonic microphone jammer.

, , , , , , and . CCF Trans. Pervasive Comput. Interact., 3 (4): 367-377 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physical-World Attack towards WiFi-based Behavior Recognition., , , , , and . INFOCOM, page 400-409. IEEE, (2022)An Efficient MLP-based Point-guided Segmentation Network for Ore Images with Ambiguous Boundary., , , , , , , and . CoRR, (2024)GIN-SD: Source Detection in Graphs with Incomplete Nodes via Positional Encoding and Attentive Fusion., , , , and . CoRR, (2024)Efficient Segmentation with Texture in Ore Images Based on Box-supervised Approach., , , , , and . CoRR, (2023)A robot path planning method based on synergy behavior of cockroach colony., , , , and . Int. Arab J. Inf. Technol., 20 (5): 717-726 (2023)Cockroach swarm optimization using aneighborhood-based strategy., , and . Int. Arab J. Inf. Technol., 16 (4): 784-790 (2019)Cardiac arrhythmia classification by time-frequency features inputted to the designed convolutional neural networks., , , and . Biomed. Signal Process. Control., 79 (Part): 104224 (2023)FS-OreDet: Feature enhancement and relationship exploration for boosting few-shot object detector of ore images., , , , , , , and . Eng. Appl. Artif. Intell., (2024)Influence maximization through exploring structural information., , , , , and . Appl. Math. Comput., (2023)Locating Multi-Sources in Social Networks With a Low Infection Rate., , , , and . IEEE Trans. Netw. Sci. Eng., 9 (3): 1853-1865 (2022)