Author of the publication

Go Beyond RFID: Rethinking the Design of RFID Sensor Tags for Versatile Applications.

, , , , , , and . MobiCom, page 69:1-69:16. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary machine learning builds smart education big data platform: Data-driven higher education., , , , , and . Appl. Soft Comput., (March 2023)LEGO: Empowering Chip-Level Functionality Plug-and-Play for Next-Generation IoT Devices., , , , , , , and . ASPLOS (3), page 404-418. ACM, (2023)Realizing Power-efficient Encryption Communication for Computational RFID Tags., , , and . CBD, page 212-218. IEEE, (2022)Go Beyond RFID: Rethinking the Design of RFID Sensor Tags for Versatile Applications., , , , , , and . MobiCom, page 69:1-69:16. ACM, (2023)Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via Backscatter., , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 2434-2447 (July 2024)μMote: Enabling Passive Chirp De-spreading and μW-level Long-Range Downlink for Backscatter Devices., , , , , , , and . NSDI, page 1751-1766. USENIX Association, (2023)Rethinking Power Efficiency for Next-Generation Processor-Free Sensing Devices., , , , and . Sensors, 22 (8): 3074 (2022)PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices., and . SPSM@CCS, page 15-26. ACM, (2015)Node-Wise Domain Adaptation Based on Transferable Attention for Recognizing Road Rage via EEG., , , , , and . ICASSP, page 1-5. IEEE, (2023)Passive DSSS: Empowering the Downlink Communication for Backscatter Systems., , , , , , , and . NSDI, page 913-928. USENIX Association, (2022)