Author of the publication

Mining cell-id trajectory patterns by exploiting handoff features.

, , , and . UbiComp Adjunct, page 153-156. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smartphone-based activity recognition independent of device orientation and placement., , , and . Int. J. Commun. Syst., 29 (16): 2403-2415 (2016)DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network., , , , and . KSII Trans. Internet Inf. Syst., 13 (4): 2180-2197 (2019)Mining cell-id trajectory patterns by exploiting handoff features., , , and . UbiComp Adjunct, page 153-156. ACM, (2016)An Interpretable Orientation and Placement Invariant Approach for Smartphone Based Activity Recognition., , , and . UIC/ATC/ScalCom, page 143-150. IEEE Computer Society, (2015)Extracting semantic event information from distributed sensing devices using fuzzy sets., , , , and . Fuzzy Sets Syst., (2018)Detecting traffic congestions using cell phone accelerometers., , , and . UbiComp Adjunct, page 107-110. ACM, (2014)Elucidating genetic and molecular basis of altered higher-order brain structure-function coupling in major depressive disorder., , , , , , , , , and . NeuroImage, (2024)TCFP: A Novel Privacy-Aware Edge Vehicular Trajectory Compression Scheme Using Fuzzy Markovian Prediction., , , , , and . SMC, page 1217-1223. IEEE, (2023)Discovering personally semantic places from GPS trajectories., , and . CIKM, page 1552-1556. ACM, (2012)General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)