Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks., , and . Int. J. Inf. Secur. Priv., 9 (2): 31-59 (2015)A privacy-preserving aggregation scheme based on negative survey for vehicle fuel consumption data., , , , , and . Inf. Sci., (2021)Weighted Document Frequency for feature selection in text classification., , , and . IALP, page 132-135. IEEE, (2015)MSPP: A Trajectory Privacy-Preserving Framework for Participatory Sensing Based on Multi-Strategy., , and . GLOBECOM Workshops, page 1-6. IEEE, (2019)Long-range ambient LoRa backscatter with parallel decoding., , , and . MobiCom, page 684-696. ACM, (2021)FlipLoRa: Resolving Collisions with Up-Down Quasi-Orthogonality., , , and . SECON, page 1-9. IEEE, (2020)Pyramid: Real-Time LoRa Collision Decoding with Peak Tracking., , and . INFOCOM, page 1-9. IEEE, (2021)CoLoRa: Enabling Multi-Packet Reception in LoRa Networks., , and . IEEE Trans. Mob. Comput., 22 (6): 3224-3240 (June 2023)From Demodulation to Decoding: Toward Complete LoRa PHY Understanding and Implementation., , , and . ACM Trans. Sens. Networks, 18 (4): 64:1-64:27 (November 2022)Dandelion: An Online Testbed for LoRa Development., , , , and . MSN, page 439-444. IEEE, (2019)