Author of the publication

On Eliminating Blocking Interference of RFID Unauthorized Reader Detection.

, , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 591-602. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scale Balanced Loss for Bounding Box Regression., , , , , , , and . IEEE Access, (2020)SNR-Centric Power Trace Extractors for Side-Channel Attacks., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (4): 620-632 (2021)An Efficient Anomaly Detection Framework for Electromagnetic Streaming Data., , , , and . ICBDC, page 151-155. ACM, (2019)On Eliminating Blocking Interference of RFID Unauthorized Reader Detection., , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 591-602. Springer, (2022)Hierarchical Graph Convolutional Skeleton Transformer for Action Recognition., , , , , , and . ICME, page 1-6. IEEE, (2022)CAAE: A Novel Wireless Spectrum Anomaly Detection Method with Multiple Scoring Criterion., , and . ICT, page 1-5. IEEE, (2021)Group Verification Based Multiple-Differential Collision Attack., , , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 145-156. Springer, (2016)Enhanced Correlation Power Analysis by Biasing Power Traces., , , , , and . ISC, volume 9866 of Lecture Notes in Computer Science, page 59-72. Springer, (2016)A Novel Method for Specific Emitter Identification Based on Singular Spectrum Analysis., , , and . WCNC, page 1-6. IEEE, (2017)Power Traces Clipping and Splicing Enhanced Correlation Collision Analysis., , , , and . Trustcom/BigDataSE/ISPA, page 989-995. IEEE, (2016)