Author of the publication

Towards Attack-Resistant Peer-Assisted Indoor Localization.

, , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 417-437. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UGCC: Social Media User Geolocation via Cyclic Coupling., , , , and . IEEE Trans. Big Data, 9 (4): 1128-1141 (August 2023)Watch Out for Race Condition Attacks When Using Android External Storage., , , and . CCS, page 891-904. ACM, (2022)EV-Linker: Mapping eavesdropped Wi-Fi packets to individuals via electronic and visual signal matching., , , and . J. Comput. Syst. Sci., 82 (1): 156-172 (2016)A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment., , , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 663-677. Springer, (2022)A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning., , , , and . ICBDS, volume 1796 of Communications in Computer and Information Science, page 63-79. Springer, (2022)Neural Attention Networks for Recommendation With Auxiliary Data., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (2): 1125-1139 (June 2023)Securing peer-assisted indoor localization leveraging acoustic ranging., , and . Comput. Secur., (2019)Secure Keyboards Against Motion Based Keystroke Inference Attack., , , and . SecureComm, volume 198 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 63-81. Springer, (2016)Towards Attack-Resistant Peer-Assisted Indoor Localization., , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 417-437. Springer, (2015)An Empirical Analysis of Hazardous Uses of Android Shared Storage., , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (1): 340-355 (2021)