Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Crowdsourced Spectrum Sensing., and . IEEE/ACM Trans. Netw., 26 (3): 1236-1249 (2018)SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing., , , and . IEEE Trans. Wirel. Commun., 15 (3): 1716-1728 (2016)Your face your heart: Secure mobile face authentication with photoplethysmograms., , , , , and . INFOCOM, page 1-9. IEEE, (2017)iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft., , , , and . CCS, page 933-944. ACM, (2016)TIGHT: A Geographic Routing Protocol for Cognitive Radio Mobile Ad Hoc Networks., , , and . IEEE Trans. Wirel. Commun., 13 (8): 4670-4681 (2014)SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing., , , and . CoRR, (2015)SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users., , , and . CCS, page 304-315. ACM, (2015)Adaptive fast DIRECT mode decision algorithm using mode and Lagrangian cost prediction for B frame in H.264/AVC., , , , , and . ICME, page 1-6. IEEE Computer Society, (2011)Highly Parallel and Fully Reused H.264/AVC High Profile Intra Predictor Generation Engine for Super Hi-Vision 4k×4k@60 fps., , , , and . IEICE Trans. Electron., 94-C (4): 428-438 (2011)POWERFUL: Mobile app fingerprinting via power analysis., , , , and . INFOCOM, page 1-9. IEEE, (2017)