Author of the publication

P2-SAS: preserving users' privacy in centralized dynamic spectrum access systems.

, , , , , , , and . MobiHoc, page 321-330. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Public Verifiability and Data Dynamics for Storage Security., , , , and . IACR Cryptology ePrint Archive, (2009)Multipodal Structure and Phase Transitions in Large Constrained Graphs., , , and . CoRR, (2014)SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing., , , , , , , , and . NDSS, The Internet Society, (2022)How Privacy Leaks From Bluetooth Mouse?, , , , , , and . NDSS, The Internet Society, (2013)ShapleyFL: Robust Federated Learning Based on Shapley Value., , , , , , , and . KDD, page 2096-2108. ACM, (2023)Endemic Oblivious Transfer via Random Oracles, Revisited., , , and . EUROCRYPT (1), volume 14004 of Lecture Notes in Computer Science, page 303-329. Springer, (2023)mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect., , , , , , , , and . INFOCOM, page 820-829. IEEE, (2022)ANetQA: A Large-scale Benchmark for Fine-grained Compositional Reasoning over Untrimmed Videos., , , , , , and . CVPR, page 23191-23200. IEEE, (2023)Encrypted Databases: Progresses and Challenges.. AsiaCCS, page 628. ACM, (2021)MandiPass: Secure and Usable User Authentication via Earphone IMU., , , , , and . ICDCS, page 674-684. IEEE, (2021)