Author of the publication

Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices.

, , , , , , , , and . IEEE Trans. Consumer Electron., 70 (1): 4605-4616 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quality-guided image classification toward information management applications., , , and . J. Vis. Commun. Image Represent., (2019)无线传感器网络(k, m)-容错连通支配集的分布式构建 (Distributed Construction for (k, m)-Fault Tolerant Connected Dominating Set in Wireless Sensor Network)., , and . 计算机科学, 43 (1): 128-132 (2016)无线传感器网络中一种改进的能效数据收集协议 (Improved Energy Efficient Data Gathering Protocol in Wireless Sensor Network)., , and . 计算机科学, 42 (2): 65-69 (2015)Distributed Fusion Tracking Estimation Under Range-Only Measurement., , and . IEEE Access, (2022)Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems., , , and . IEEE Trans. Inf. Forensics Secur., 14 (5): 1337-1350 (2019)The Importance of Expert Knowledge for Automatic Modulation Open Set Recognition., , , , , , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 45 (11): 13730-13748 (November 2023)Meta-WF: Meta-Learning-Based Few-Shot Wireless Impersonation Detection for Wi-Fi Networks., , , , and . IEEE Commun. Lett., 25 (11): 3585-3589 (2021)Toward Cooperative 3D Object Reconstruction with Multi-agent., , , , , , and . ICRA, page 4975-4982. IEEE, (2023)Neural Mode Estimation., , , , and . ICASSP, page 1-5. IEEE, (2023)Near-Complete Privacy Protection: Cognitive Optimal Strategy in Location-Based Services., , , , , and . IIKI, volume 129 of Procedia Computer Science, page 298-304. Elsevier, (2017)