From post

Robust Wireless Localization: Attacks and Defenses.

, , , , и . Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, том 30 из Advances in Information Security, Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling professional similarity by mining professional career trajectories., , , , и . KDD, стр. 1945-1954. ACM, (2014)TransRec: Learning Transferable Recommendation from Mixture-of-Modality Feedback., , , , , , , , и . CoRR, (2022)Masked-field Pre-training for User Intent Prediction., , , , , и . CIKM, стр. 2789-2796. ACM, (2020)Fading broadcast channels with state information at the receivers., , и . Allerton, стр. 221-227. IEEE, (2008)One for All, All for One: Learning and Transferring User Embeddings for Cross-Domain Recommendation., , , , , , , и . WSDM, стр. 366-374. ACM, (2023)Deep Natural Language Processing for Search and Recommendation., , , , и . SIGIR, стр. 2461-2463. ACM, (2020)AHINE: Adaptive Heterogeneous Information Network Embedding., , , , , и . ICKG, стр. 100-107. IEEE, (2020)Securing wireless systems via lower layer enforcements., , , и . Workshop on Wireless Security, стр. 33-42. ACM, (2006)The Adoption and Implementation of RFID Technologies in Healthcare: A Literature Review., , и . J. Medical Systems, 36 (6): 3507-3525 (2012)AHINE: Adaptive Heterogeneous Information Network Embedding., , , и . CoRR, (2019)