Author of the publication

EV-Linker: Mapping eavesdropped Wi-Fi packets to individuals via electronic and visual signal matching.

, , , and . J. Comput. Syst. Sci., 82 (1): 156-172 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Kim-Jeon-Yoo Password Authentication Schemes., and . Cryptologia, 33 (2): 183-187 (2009)MICOR: A Market for Incentive-Compatible Cooperative Relay in Cognitive Radio Networks., , and . IEEE Trans. Veh. Technol., 64 (11): 5350-5367 (2015)A New Orientation Estimation Method Based on Rotation Invariant Gradient for Feature Points., , , , and . IEEE Geosci. Remote. Sens. Lett., 18 (5): 791-795 (2021)An efficient protocol for private and accurate mining of support counts., , and . Pattern Recognit. Lett., 30 (1): 80-86 (2009)Cross-Channel Graph Convolutional Networks for Skeleton-Based Action Recognition., , , , , , , , and . IEEE Access, (2021)Topology-Preserving Traffic Engineering for Hierarchical Multi-Domain SDN., , , , , and . Comput. Networks, (2018)Privacy-preserving algorithms for distributed mining of frequent itemsets.. Inf. Sci., 177 (2): 490-503 (2007)Weighted Low-Rank Tensor Recovery for Hyperspectral Image Restoration., , , , , and . IEEE Trans. Cybern., 50 (11): 4558-4572 (2020)Toward Wireless Security without Computational Assumptions - Oblivious Transfer Based on Wireless Channel Characteristics., , , , , and . IEEE Trans. Computers, 63 (6): 1580-1593 (2014)Towards a theory of data entanglement., , , and . Theor. Comput. Sci., 389 (1-2): 26-43 (2007)