Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study on Urban IEEE 802.11p Vehicle-to-Vehicle Communication., , , , , , and . SECON, page 1-9. IEEE, (2016)Perceiving accurate CSI phases with commodity WiFi devices., , , and . INFOCOM, page 1-9. IEEE, (2017)Hierarchical gradient based parameter identification for non-uniformly sampling Wiener systems., , , , and . Comput. Syst. Sci. Eng., (2016)ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes., , , and . IEEE Trans. Mob. Comput., 16 (10): 2901-2912 (2017)Private and Flexible Urban Message Delivery., , , , , and . IEEE Trans. Veh. Technol., 65 (7): 4900-4910 (2016)Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks., , , , , and . Comput. Networks, (2014)Molecular Dynamics Simulations of Ternary Complexes: Comparisons of LEAFY Protein Binding to Different DNA Motifs., , , , and . J. Chem. Inf. Model., 55 (4): 784-794 (2015)Footprint: Detecting Sybil Attacks in Urban Vehicular Networks., , , , and . IEEE Trans. Parallel Distributed Syst., 23 (6): 1103-1114 (2012)Vulnerability aware graphs for RFID protocol security benchmarking., , , , and . J. Comput. Syst. Sci., 81 (6): 1027-1041 (2015)MoGDE: Boosting Mobile Monocular 3D Object Detection with Ground Depth Estimation., , , , , and . CoRR, (2023)