From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient and secure key extraction using channel state information., , , и . J. Supercomput., 70 (3): 1537-1554 (2014)A Platform for Free-Weight Exercise Monitoring with Passive Tags., , , , , , , , и . IEEE Trans. Mob. Comput., 16 (12): 3279-3293 (2017)Adversary Helps: Gradient-based Device-Free Domain-Independent Gesture Recognition., , , и . CoRR, (2020)FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing., , , , , , , , , и . NDSS, The Internet Society, (2022)Expelliarmus: Command Cancellation Attacks on Smartphones using Electromagnetic Interference., , , , , , и . INFOCOM, стр. 1-10. IEEE, (2023)ShakeReader: 'Read' UHF RFID using Smartphone., , , и . INFOCOM, стр. 1-10. IEEE, (2021)Collision-driven physical-layer identification of RFID UHF tags., , и . ICNP, стр. 1-3. IEEE Computer Society, (2013)GenePrint: Generic and accurate physical-layer identification for UHF RFID tags., , , , и . ICNP, стр. 1-10. IEEE Computer Society, (2013)CBID: A Customer Behavior Identification System Using Passive Tags., , , , , , , и . ICNP, стр. 47-58. IEEE Computer Society, (2014)Instant and Robust Authentication and Key Agreement among Mobile Devices., , , , , , и . CCS, стр. 616-627. ACM, (2016)