Author of the publication

WavoID: Robust and Secure Multi-modal User Identification via mmWave-voice Mechanism.

, , , , , , , , and . UIST, page 64:1-64:15. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving multi-keyword ranked search over encrypted cloud data., , , , and . INFOCOM, page 829-837. IEEE, (2011)Proof-carrying cloud computation: The case of convex optimization., , , , and . INFOCOM, page 610-614. IEEE, (2013)Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids., , , , and . IEEE Netw., 31 (1): 59-63 (2017)MsDroid: Identifying Malicious Snippets for Android Malware Detection., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2025-2039 (May 2023)Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (2): 77:1-77:26 (2022)Task-aware Similarity Learning for Event-triggered Time Series., , , , and . CoRR, (2022)A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses., , , , , , , and . IEEE Commun. Surv. Tutorials, 24 (4): 2292-2328 (2022)Towards Fairness-aware Adversarial Network Pruning., , , , , , and . ICCV, page 5145-5154. IEEE, (2023)SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud., , , , and . AsiaCCS, page 257-268. ACM, (2016)FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis., , , and . CCS, page 416-430. ACM, (2023)