Author of the publication

Brain-Hack: Remotely Injecting False Brain-Waves with RF to Take Control of a Brain-Computer Interface.

, , and . CPSIOTSEC@CCS, page 53-66. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms and Architectures: A Case Study in When, Where and How to Connect Vehicles., , and . IEEE Intell. Transport. Syst. Mag., 10 (1): 74-87 (2018)Cloud computing, REST and Mashups to simplify RFID application development and deployment., , and . WoT, page 9. ACM, (2011)Collision-free finishing toolpaths from visibility data., , and . Comput. Aided Des., 35 (4): 359-374 (2003)Real-time Trust-Building Schemes for Mitigating Malicious Behaviors in Connected and Automated Vehicles., and . ITSC, page 1142-1149. IEEE, (2019)Low-Cost, Ubiquitous RFID-Tag-Antenna-Based Sensing., , and . Proc. IEEE, 98 (9): 1593-1600 (2010)Performance assessment of XACML authorizations for Supply Chain Traceability Web Services., , , and . CASoN, page 378-383. IEEE, (2012)Colorwave: a MAC for RFID reader networks., , and . WCNC, page 1701-1704. IEEE, (2003)The Networked Physical World System., , , and . ICWI, page 104-111. IADIS, (2002)A Pseudopolynomial Time O (log n )-Approximation Algorithm for Art Gallery Problems., , , and . WADS, volume 4619 of Lecture Notes in Computer Science, page 163-174. Springer, (2007)Can small smart swappable battery EVs outperform gas powertrain economics?, , and . ITSC, page 1-6. IEEE, (2017)