Author of the publication

Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors.

, , , , , , , and . IEEE Trans. Mob. Comput., 15 (8): 1965-1981 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symphony: Synchronous Two-Phase Rate and Power Control in 802.11 WLANs., , , and . IEEE/ACM Trans. Netw., 18 (4): 1289-1302 (2010)Exploiting vertical diversity in vehicular channel environments., , and . PIMRC, page 958-962. IEEE, (2009)Creating wireless multi-hop topologies on space-constrained indoor testbeds through noise injection., , and . TRIDENTCOM, IEEE, (2006)A Multi-rate Congestion Controller for Pedestrian Communication., , , , and . VNC, page 1-8. IEEE, (2019)Preserving privacy in gps traces via uncertainty-aware path cloaking., , , and . ACM Conference on Computer and Communications Security, page 161-171. ACM, (2007)Capacitive Touch Communication: A Technique to Input Data through Devices' Touch Screen., , , , , , , and . IEEE Trans. Mob. Comput., 13 (1): 4-19 (2014)The Boomerang Protocol: Tying Data to Geographic Locations in Mobile Disconnected Networks., , , and . IEEE Trans. Mob. Comput., 11 (7): 1113-1126 (2012)LookUp: Enabling Pedestrian Safety Services via Shoe Sensing., , , , , and . MobiSys, page 257-271. ACM, (2015)Reading between lines: high-rate, non-intrusive visual codes within regular videos via ImplicitCode., , , and . UbiComp, page 157-168. ACM, (2015)Do not share!: invisible light beacons for signaling preferences to privacy-respecting cameras., , , , , and . VLCS@MobiCom, page 39-44. ACM, (2014)