Author of the publication

You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID.

, , , , and . IEEE Commun. Surv. Tutorials, 19 (3): 1682-1700 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specific, Non-Invasive, and Magnetically Directed Targeting of Magnetic Erythrocytes in Blood Vessels of Mice., , , , , , , , , and . IEEE Trans. Biomed. Eng., 67 (8): 2276-2285 (2020)Adaptive fault-tolerant control with prescribed performance for switched nonlinear pure-feedback systems., , , and . J. Frankl. Inst., 355 (1): 273-290 (2018)DuReader: a Chinese Machine Reading Comprehension Dataset from Real-world Applications, , , , , , , , , and 3 other author(s). (2017)cite arxiv:1711.05073Comment: 10 pages, ACL 2018 MRQA Workshop camera-ready version.From Regression Based on Dynamic Filter Network to Pansharpening by Pixel-Dependent Spatial-Detail Injection., , , and . Remote. Sens., 14 (5): 1242 (2022)An Object Model of Direction and Its Implications., , and . GeoInformatica, 3 (4): 357-379 (1999)Image registration algorithm based on point features of sub-pixel., , and . IGARSS, page 501-504. IEEE, (2015)Object-Based Directional Query Processing in Spatial Databases., , and . IEEE Trans. Knowl. Data Eng., 15 (2): 295-304 (2003)Modeling of Local False Data Injection Attacks With Reduced Network Information., , , and . IEEE Trans. Smart Grid, 6 (4): 1686-1696 (2015)Design of a software-defined resilient virtualized networking environment., , , and . DRCN, page 111-114. IEEE, (2015)Approaching the time lower bound on cloned-tag identification for large RFID systems., , and . Ad Hoc Networks, (2014)