Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Near field authentication for smart devices., , and . INFOCOM, page 375-379. IEEE, (2013)Checking in without worries: Location privacy in location based social networks., , and . INFOCOM, page 3003-3011. IEEE, (2013)Searching in the dark: A framework for authenticating unknown users in online social networks., , and . GLOBECOM, page 714-719. IEEE, (2012)Analyzing Worldwide Social Distancing through Large-Scale Computer Vision., , , , , , , , , and 8 other author(s). CoRR, (2020)Secure cloud-assisted location based reminder., , and . AsiaCCS, page 323-328. ACM, (2013)Geolocation Error Estimation Method for the Wide Swath Polarized Scanning Atmospheric Corrector Onboard HJ-2 A/B Satellites., , , , , , , , , and 2 other author(s). IEEE Trans. Geosci. Remote. Sens., (2022)The Power of Whispering: Near Field Assertions via Acoustic Communications., , and . AsiaCCS, page 627-632. ACM, (2015)Unobservable Re-authentication for Smartphones., , and . NDSS, The Internet Society, (2013)Large Kernel Attention Hashing for Efficient Image Retrieval., , , , and . WCSP, page 77-82. IEEE, (2022)A Proximity Authentication System for Smartphones., , and . IEEE Trans. Dependable Secur. Comput., 13 (6): 605-616 (2016)