Author of the publication

Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds.

, , , , , , , and . ICDCS, page 680-690. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint optimization of detection threshold and resource allocation in infrastructure-based multi-band cognitive radio networks., , , , , and . EURASIP J. Wireless Comm. and Networking, (2012)Coordinated Blanking for 5G Millimeter-Wave Networks Spectrum Sharing., and . VTC Spring, page 1-5. IEEE, (2016)iDTT: Delay Tolerant Data Transfer for P2P File Sharing Systems., , and . GLOBECOM, page 1-5. IEEE, (2011)Numerical solution for an inverse heat source problem by an iterative method., , and . Appl. Math. Comput., (2014)Technical Note - Perishable Inventory Systems: Convexity Results for Base-Stock Policies and Learning Algorithms Under Censored Demand., , and . Oper. Res., 66 (5): 1276-1286 (2018)Nonparametric Learning Algorithms for Joint Pricing and Inventory Control with Lost Sales and Censored Demand., , and . Math. Oper. Res., 46 (2): 726-756 (2021)Learnable Leakage and Onset-Spiking Self-Attention in SNNs with Local Error Signals., , , and . Sensors, 23 (24): 9781 (December 2023)COSMOS: computation offloading as a service for mobile devices., , , , , and . MobiHoc, page 287-296. ACM, (2014)Joint Pricing and Inventory Management with Strategic Customers., and . EC, page 515. ACM, (2017)5GS Assistance for Federated Learning Member Selection in Trajectory Prediction Scenarios., , , , , , , , and . ICCC Workshops, page 216-220. IEEE, (2022)