Author of the publication

Location-restricted Services Access Control Leveraging Pinpoint Waveforming.

, , , and . CCS, page 292-303. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Jetto: Using Lateral Force Feedback for Smartwatch Interactions., , , , , , , , , and . CHI, page 426. ACM, (2018)Block coordinate descentwith time perturbation for nonconvex nonsmooth problems in real-world studies., , , , and . Frontiers Inf. Technol. Electron. Eng., 20 (10): 1390-1403 (2019)Fractional Fourier transform based auditory feature for language identification., , , and . APCCAS, page 209-212. IEEE, (2008)Yoyo trick on type-II generalised Feistel networks., and . IET Inf. Secur., 15 (6): 457-471 (2021)A Hybrid Short-Term Load Forecasting Model Based on Improved Fuzzy C-Means Clustering, Random Forest and Deep Neural Networks., , , and . IEEE Access, (2021)Research on Detection and Correction of High-Speed Train Idling and Skidding Based on Improved Fuzzy Neural Network., , and . Autom. Control. Comput. Sci., 58 (3): 274-288 (June 2024)Computing Zigzag Vineyard Efficiently Including Expansions and Contractions., and . CoRR, (2023)Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation., , , and . IEEE/ACM Trans. Netw., 29 (6): 2779-2792 (2021)Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic., , , and . GlobalSIP, page 1-5. IEEE, (2019)IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification., , , , and . DySPAN, page 280-287. IEEE, (2021)