Author of the publication

IoTBeholder: A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Traffic.

, , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 7 (1): 43:1-43:26 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Every Cycle-Connected Multipartite Tournament with δ ≥ 2 Contains At Least Two Universal Arcs., , and . Graphs Comb., 29 (4): 1141-1149 (2013)Interior Estimates of Finite Volume Element Methods Over Quadrilateral Meshes for Elliptic Equations., , and . SIAM J. Numer. Anal., 57 (5): 2246-2265 (2019)A Recovery Based Linear Finite Element Method For 1D Bi-Harmonic Problems., , and . J. Sci. Comput., 68 (1): 375-394 (2016)Correction to: Superconvergence of Immersed Finite Volume Methods for One-Dimensional Interface Problems., , , and . J. Sci. Comput., 74 (1): 605 (2018)A Family of Finite Volume Schemes of Arbitrary Order on Rectangular Meshes., and . J. Sci. Comput., 58 (2): 308-330 (2014)Adaptive trajectories sampling for solving PDEs with deep learning methods., , and . CoRR, (2023)Deep Finite Volume Method for High-Dimensional Partial Differential Equations., , , and . CoRR, (2023)Interactive Surgical Planning Using Context Based Volume Visualization Techniques., , and . MIAR, page 21-25. IEEE Computer Society, (2001)A Molecular Dynamics Based Multi-scale Platelet Aggregation Model and Its High-Throughput Simulation., and . PDCAT, volume 13148 of Lecture Notes in Computer Science, page 81-92. Springer, (2021)IoTBeholder: A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Traffic., , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 7 (1): 43:1-43:26 (March 2023)