Author of the publication

Fusang: Graph-inspired Robust and Accurate Object Recognition on Commodity mmWave Devices.

, , , , , , and . MobiSys, page 489-502. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Dynamic Scheduling for VM-Based Code Obfuscation., , , , , , , , and . Trustcom/BigDataSE/ISPA, page 489-496. IEEE, (2016)Poster: doppler effect based device-free moving object localization., , , , , and . MobiCom, page 441-444. ACM, (2014)FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas., , , , , , and . INFOCOM, page 1-9. IEEE, (2016)Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes., , , , , , , and . Mob. Inf. Syst., (2017)Poster: Just-Microsecond Deblurring System on the Mobile Phone., , , , and . EWSN, page 230-231. Junction Publishing, Canada / ACM, (2017)WisDriver: A WiFi and Smartphone Sensing System for Safely Driving., , , , , , , and . PACRIM, page 1-6. IEEE, (2019)Artistic information extraction from Chinese calligraphy works via Shear-Guided filter., , , , , , and . J. Vis. Commun. Image Represent., (2016)RF-Identity: Non-Intrusive Person Identification Based on Commodity RFID Devices., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 5 (1): 9:1-9:23 (2021)Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)E2PP: An Energy-Efficient Path Planning Method for UAV-Assisted Data Collection., , , , , , , and . Secur. Commun. Networks, (2020)