Author of the publication

Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting.

, , , , , , and . IEEE/ACM Trans. Netw., 30 (1): 394-408 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dual Learning-Based Safe Semi-Supervised Learning., , , and . IEEE Access, (2018)PeerDedupe: Insights into the Peer-Assisted Sampling Deduplication., , and . Peer-to-Peer Computing, page 1-10. IEEE, (2010)Companion Paper for., , , , , , , , and . ACM Multimedia, page 1085-1088. ACM, (2019)Bioinformatics analysis of a non-specific nuclease from Yersinia enterocolitica subsp. palearctica., , , , and . Comput. Biol. Chem., (2013)Contour-based multisensor image registration with rigid transformation., and . FUSION, page 1-7. IEEE, (2007)Maximizing the bandwidth multiplier effect for hybrid cloud-P2P content distribution., , , , and . IWQoS, page 1-9. IEEE, (2012)Image Deblurring Using a Robust Loss Function., , , , , and . Circuits Syst. Signal Process., 41 (3): 1704-1734 (2022)LSTAloc: A Driver-Oriented Incentive Mechanism for Mobility-on-Demand Vehicular Crowdsensing Market., , , , , , and . IEEE Trans. Mob. Comput., 23 (4): 3106-3122 (April 2024)Aging or Glitching? What Leads to Poor Android Responsiveness and What Can We Do About It?, , , , , , and . IEEE Trans. Mob. Comput., 23 (2): 1521-1533 (February 2024)Overlay-Based Android Malware Detection at Market Scales: Systematically Adapting to the New Technological Landscape., , , , , and . IEEE Trans. Mob. Comput., 21 (12): 4488-4501 (2022)