From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Pitchln: eavesdropping via intelligible speech reconstruction using non-acoustic sensor fusion., , и . IPSN, стр. 181-192. ACM, (2017)Convoy: Physical Context Verification for Vehicle Platoon Admission., , , , и . HotMobile, стр. 73-78. ACM, (2017)SuperAD: supervised activity discovery., , , и . UbiComp/ISWC Adjunct, стр. 1463-1472. ACM, (2015)Throughput optimization for multipath unicast routing under probabilistic jamming., , , , и . PIMRC, стр. 1-5. IEEE, (2008)All your jammers belong to us - Localization of wireless sensors under jamming attack., , , и . ICC, стр. 949-954. IEEE, (2012)Stochastic optimization of flow-jamming attacks in multichannel wireless networks., , и . ICC, стр. 2165-2170. IEEE, (2013)Towards secure multi-path routing for wireless mobile ad-hoc networks: A cross-layer strategy., и . SECON, стр. 146-148. IEEE, (2011)Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection., и . PECCS, стр. 431-439. SciTePress, (2012)Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponents, и . Pervasive and Mobile Computing, (2014)Using bluetooth low energy spoofing to dispute device details: demo., и . WiSec, стр. 340-342. ACM, (2019)