Author of the publication

Simultaneous Material Identification and Target Imaging with Commodity RFID Devices.

, , , , , and . IEEE Trans. Mob. Comput., 20 (2): 739-753 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks., , , , , , and . Ad Hoc Sens. Wirel. Networks, 35 (1-2): 41-66 (2017)FitLoc: Fine-Grained and Low-Cost Device-Free Localization for Multiple Targets Over Various Areas., , , , , , and . IEEE/ACM Trans. Netw., 25 (4): 1994-2007 (2017)Poster: On the Low-Cost and Distance-Adaptive Device-free Localization., , , , , , and . MobiCom, page 221-223. ACM, (2015)Low-cost wireless phase calibration that works on COTS RFID systems: poster., , , , , and . MobiCom, page 439-440. ACM, (2016)Poster: A Low Cost People Flow Monitoring System For Sensing The Potential Danger., , , , , , and . MobiCom, page 242-244. ACM, (2015)Beyond Respiration: Contactless Sleep Sound-Activity Recognition Using RF Signals., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (3): 96:1-96:22 (2019)LungTrack: Towards Contactless and Zero Dead-Zone Respiration Monitoring with Commodity RFIDs., , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (3): 79:1-79:22 (2019)Prioritizing the Data in the Target-Tracking Wireless Sensor Networks., , , , , , and . GreenCom/iThings/CPScom, page 1910-1915. IEEE, (2013)Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality., , , , , , , , and . Mob. Inf. Syst., (2016)Using Generative Adversarial Networks to Break and Protect Text Captchas., , , , , , , , and . ACM Trans. Priv. Secur., 23 (2): 7:1-7:29 (2020)