Author of the publication

Robust Wireless Localization: Attacks and Defenses.

, , , , and . Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, volume 30 of Advances in Information Security, Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling professional similarity by mining professional career trajectories., , , , and . KDD, page 1945-1954. ACM, (2014)TransRec: Learning Transferable Recommendation from Mixture-of-Modality Feedback., , , , , , , , and . CoRR, (2022)Masked-field Pre-training for User Intent Prediction., , , , , and . CIKM, page 2789-2796. ACM, (2020)Fading broadcast channels with state information at the receivers., , and . Allerton, page 221-227. IEEE, (2008)AHINE: Adaptive Heterogeneous Information Network Embedding., , , , , and . ICKG, page 100-107. IEEE, (2020)Deep Natural Language Processing for Search and Recommendation., , , , and . SIGIR, page 2461-2463. ACM, (2020)One for All, All for One: Learning and Transferring User Embeddings for Cross-Domain Recommendation., , , , , , , and . WSDM, page 366-374. ACM, (2023)Securing wireless systems via lower layer enforcements., , , and . Workshop on Wireless Security, page 33-42. ACM, (2006)Interpretable Text Classification Using CNN and Max-pooling., , , , and . CoRR, (2019)One for All, All for One: Learning and Transferring User Embeddings for Cross-Domain Recommendation., , , , , , , and . CoRR, (2022)