Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Live Video Forensics: Source Identification in Lossy Wireless Networks., , , and . IEEE Trans. Inf. Forensics Secur., 10 (1): 28-39 (2015)Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks., , , and . IEEE Trans. Inf. Forensics Secur., 8 (9): 1497-1507 (2013)Monitoring vital signs using millimeter wave., , , , and . MobiHoc, page 211-220. ACM, (2016)Guest Editors' Introduction: Internet Data Centers., and . Computer, 37 (11): 35-37 (2004)On Availability-Performability Tradeoff in Wireless Mesh Networks., , and . IEEE Trans. Mob. Comput., 14 (3): 606-618 (2015)StrLight: An Imperceptible Visible Light Communication System with String Lights., , , , and . IEEE Trans. Mob. Comput., 18 (7): 1674-1687 (2019)Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN., , , , , , , , , and . IEEE Trans. Mob. Comput., 23 (1): 941-954 (January 2024)Towards System-Level Security Analysis of IoT Using Attack Graphs., , , , , , and . IEEE Trans. Mob. Comput., 23 (2): 1142-1155 (February 2024)Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications., , , , , , , and . IEEE Trans. Mob. Comput., 20 (10): 3066-3080 (2021)Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing., , , and . IEEE Trans. Mob. Comput., 13 (12): 2777-2790 (2014)