Author of the publication

Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks.

, , and . INFOCOM, page 73-81. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Outlier Measurements Based on Graph Rigidity for Wireless Sensor Network Localization., , , , , and . IEEE Trans. Veh. Technol., 62 (1): 374-383 (2013)Localizing Multiple Acoustic Sources With a Single Microphone Array., , , and . IEEE Trans. Mob. Comput., 22 (10): 5963-5977 (October 2023)Full-Dimension Relative Positioning for RFID-Enabled Self-Checkout Services., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 5 (1): 7:1-7:23 (2021)WiFi-Based Indoor Line-of-Sight Identification., , , , , , and . IEEE Trans. Wirel. Commun., 14 (11): 6125-6136 (2015)Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement., , , , and . IEEE/ACM Trans. Netw., 24 (6): 3426-3438 (2016)Furtively Connecting IoT Devices with Acoustic Noise., , , and . IPSN, page 195-207. IEEE, (2022)Aloba: rethinking ON-OFF keying modulation for ambient LoRa backscatter., , , , , , and . SenSys, page 192-204. ACM, (2020)Passive diagnosis for wireless sensor networks., , , , , and . SenSys, page 113-126. ACM, (2008)ZiSense: towards interference resilient duty cycling in wireless sensor networks., , , , and . SenSys, page 119-133. ACM, (2014)Share Brings Benefits: Towards Maximizing Revenue for Crowdsourced Mobile Network Access., , , , , , and . SECON, page 1-9. IEEE, (2017)