Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TW-See: Human Activity Recognition Through the Wall With Commodity Wi-Fi Devices., , , , , and . IEEE Trans. Vehicular Technology, 68 (1): 306-319 (2019)Privacy-aware data publishing against sparse estimation attack., , , , and . J. Netw. Comput. Appl., (2018)Matched Averaging Federated Learning Gesture Recognition with WiFi Signals., , , and . BigCom, page 38-43. IEEE, (2021)Dynamic Multi-level Feedback Queuing based Packet Scheduling for Datacenter Networks., , , , and . BigCom, page 1-6. IEEE, (2021)Boosting Cooperative Game with Complete Information in Multi-UAV Mesh Router Networks., , , , , and . MSN, page 648-653. IEEE, (2020)A Regional Statistics Detection Scheme against Sybil Attacks in WSNs., , , , , , and . TrustCom/ISPA/IUCC, page 285-291. IEEE Computer Society, (2013)Sparsest Random Scheduling for Compressive Data Gathering in Wireless Sensor Networks., , , , and . IEEE Trans. Wirel. Commun., 13 (10): 5867-5877 (2014)Cloud is safe when compressive: Efficient image privacy protection via shuffling enabled compressive sensing., , , , and . Comput. Commun., (2018)Top-N Recommendation Using Low-Rank Matrix Completion and Spectral Clustering., , , , and . IEICE Trans. Commun., 103-B (9): 951-959 (2020)Privacy preserving RSS map generation for a crowdsensing network., , , , and . IEEE Wirel. Commun., 22 (4): 42-48 (2015)