Author of the publication

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.

, , , , , , and . ACM Conference on Computer and Communications Security, page 1068-1079. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolving network motifs based morphogenetic approach for self-organizing robotic swarms., and . GECCO, page 137-144. ACM, (2012)Self-Calibration of Camera-Equipped Robot Manipulators., and . Int. J. Robotics Res., 20 (11): 909-921 (2001)Simplified Deep Forest Model Based Just-in-Time Defect Prediction for Android Mobile Apps., , , , and . IEEE Trans. Reliab., 70 (2): 848-859 (2021)A comprehensive comparative study of clustering-based unsupervised defect prediction models., , , , , , , and . J. Syst. Softw., (2021)Automatically classifying software changes via discriminative topic model: Supporting multi-category and cross-project., , , , , and . J. Syst. Softw., (2016)Swarming particles with multi-feature model for free-selected object tracking., and . IROS, page 2553-2558. IEEE, (2008)A New PRACH Transmission Scheme in Unlicensed Spectrum., , and . VTC Spring, page 1-6. IEEE, (2017)A cellular mechanism for multi-robot construction via evolutionary multi-objective optimization of a gene regulatory network., , and . Biosyst., 98 (3): 193-203 (2009)Remote sensing image based information extraction for land salinized degradation and its evolution., and . ICNC, page 4199-4203. IEEE, (2010)Hopf Bifurcation Analysis in a Diffusive Food-Chain Model with Two Time Delays., , and . ICBBT, page 48-56. ACM, (2017)