Author of the publication

Light Auditor: Power Measurement Can Tell Private Data Leakage through IoT Covert Channels.

, , , , , and . SenSys, page 518-532. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeepMag+: Sniffing mobile apps in magnetic field through deep learning., , , , and . Pervasive Mob. Comput., (2020)Dynamic spectrum access: from cognitive radio to network radio., , , and . IEEE Wirel. Commun., 19 (1): 23-29 (2012)A Layered Graph Interface Assignment Algorithm for Multi-Channel Wireless Networks.. ICCCN, page 469-474. IEEE, (2006)Performance analysis of multihop traffic grooming in mesh WDM optical networks., and . ICCCN, page 237-242. IEEE, (2003)Tree-based Burst Aggregation in Optical Burst Switching Networks., , , and . PDCCS, page 179-184. ISCA, (2009)Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural Networks., , , and . INFOCOM, page 1-10. IEEE, (2021)Minimum Cost Broadcast in Multi-radio Multi-channel Wireless Mesh Networks., , , and . MSN, page 238-247. IEEE Computer Society, (2011)GELU-Net: A Globally Encrypted, Locally Unencrypted Deep Neural Network for Privacy-Preserved Learning., , , , and . IJCAI, page 3933-3939. ijcai.org, (2018)Energy Usage in Biomimetic Models for Massively-Deployed Sensor Networks., , , , and . ISPA Workshops, volume 3759 of Lecture Notes in Computer Science, page 434-443. Springer, (2005)A density based scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks., , and . GLOBECOM, page 623-628. IEEE, (2013)