Author of the publication

ArPat: Accurate RFID reader positioning with mere boundary tags.

, , , and . ICPADS, page 880-885. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Let's work together: Fast tag identification by interference elimination for multiple RFID readers., , , and . ICNP, page 1-10. IEEE Computer Society, (2016)One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems., , , and . ICC, page 1-6. IEEE, (2016)Distance outlier detection with a mobile beacon in wireless sensor networks localisation., , and . Int. J. Secur. Networks, 11 (3): 160-166 (2016)LSCDroid: Malware Detection Based on Local Sensitive API Invocation Sequences., , , and . IEEE Trans. Reliability, 69 (1): 174-187 (2020)Accurate IoT Device Identification based on A Few Network Traffic., , , , and . IWQoS, page 1-10. IEEE, (2023)SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks., , , , and . MASS, page 1054-1059. IEEE Computer Society, (2009)MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack., , , , and . TrustCom, page 873-880. IEEE, (2023)Minimizing Movement for Target Coverage in Mobile Sensor Networks., , , , and . ICDCS Workshops, page 194-200. IEEE Computer Society, (2012)Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks., , , , , and . Comput. Commun., 36 (10-11): 1235-1244 (2013)A Weight-Bind-Based Safe Top-k Query Processing Scheme in Two-Tiered Sensor Networks., , , , , and . SpaCCS Workshops, volume 10658 of Lecture Notes in Computer Science, page 653-666. Springer, (2017)