Author of the publication

FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas.

, , , , , , and . INFOCOM, page 1-9. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Method to Evaluate Software Protection Based on Attack Modeling., , , , , and . HPCC/EUC, page 837-844. IEEE, (2013)WideSee: towards wide-area contactless wireless sensing., , , , , , , , and . SenSys, page 258-270. ACM, (2019)Camel: Smart, Adaptive Energy Optimization for Mobile Web Interactions., , , , , , , , and . INFOCOM, page 119-128. IEEE, (2020)DexPro: A Bytecode Level Code Protection System for Android Applications., , , , , , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 367-382. Springer, (2017)W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks., , , and . IAS, page 158-162. IEEE Computer Society, (2009)Who Move the Treasures: A RFID-based Approach for the Treasures., , , , , , , and . UIC/ATC/ScalCom, page 154-162. IEEE Computer Society, (2014)Exploit dynamic data flows to protect software against semantic attacks., , , , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1-6. IEEE, (2017)Thwarting Android app repackaging by executable code fragmentation., , , , , and . IJHPCN, 10 (4/5): 320-331 (2017)Exploiting Code Diversity to Enhance Code Virtualization Protection., , , , , , , and . ICPADS, page 620-627. IEEE, (2018)A Novel Method for Protritage Site with WSN., , , , , and . HCC, volume 8944 of Lecture Notes in Computer Science, page 765-776. Springer, (2014)