From post

On Eliminating Blocking Interference of RFID Unauthorized Reader Detection.

, , , и . WASA (1), том 13471 из Lecture Notes in Computer Science, стр. 591-602. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection., , , , , и . CollaborateCom (2), том 461 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 75-90. Springer, (2022)Sparse Representation for Device-Free Human Detection and Localization with COTS RFID., , , , и . ICA3PP (1), том 11944 из Lecture Notes in Computer Science, стр. 639-654. Springer, (2019)Packings and coverings of lambdaKv by k-circuits with one chord., , и . Discret. Math., 279 (1-3): 287-315 (2004)An improved searching algorithm for indoor trajectory reconstruction., , , , , , и . Int. J. Distributed Sens. Networks, (2017)How to find valuable references? Application of text mining in abstract clustering., и . ICNC-FSKD, стр. 2201-2205. IEEE, (2017)R-TDBF: An Environmental Adaptive Method for RFID Redundant Data Filtering., , , , , и . WASA (2), том 13472 из Lecture Notes in Computer Science, стр. 582-594. Springer, (2022)An Efficient Approach of Integrating RFID and Vision Techniques in Object Surveillance System., , , , и . Trustcom/BigDataSE/ISPA, стр. 1023-1029. IEEE, (2016)3D Convolutional Two-Stream Network for Action Recognition in Videos., , , , , и . ICTAI, стр. 1697-1701. IEEE, (2019)Environmentally Adaptive Real-Time Detection of RFID False Readings in a New Practical Scenario., , , , , и . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, стр. 338-345. IEEE, (2018)Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems., , и . ISCC, стр. 74-77. IEEE, (2018)