Author of the publication

SpiderMon: Towards Using Cell Towers as Illuminating Sources for Keystroke Monitoring.

, , , , , and . INFOCOM, page 666-675. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory., , , and . IEEE Symposium on Security and Privacy Workshops, page 323-328. IEEE Computer Society, (2018)Information Geometry and Minimum Description Length Networks., , , and . ICML, volume 37 of JMLR Workshop and Conference Proceedings, page 49-58. JMLR.org, (2015)Multi-rate System Design Through Integrating Synchronous Components.. ICTAC, volume 9399 of Lecture Notes in Computer Science, page 464-482. Springer, (2015)Stochastic 2-D Motion Planning with a POMDP Framework., and . CoRR, (2018)Bayesian Ying-Yang Learning on Orthogonal Binary Factor Analysis., and . ICANN (1), volume 5163 of Lecture Notes in Computer Science, page 255-264. Springer, (2008)Experimental Quantum-enhanced Cryptographic Remote Control., , , , , and . CoRR, (2019)Intrinsic Universal Measurements of Non-linear Embeddings.. CoRR, (2018)Applications of colloidal quantum dots., , , , , , , , , and . Microelectron. J., 40 (3): 644-649 (2009)Channel Estimation for RIS-Aided Wireless Communication Systems Under Mismatched Models., , , and . ICCT, page 31-36. IEEE, (2023)A Joint Optimization Method for Scheduling and Random Access Based on the Idea of Particle-Based Access in IEEE 802.11ax., , , and . SGIoT, volume 497 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 172-185. Springer, (2022)