Author of the publication

Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space.

, , and . IEEE Trans. Mob. Comput., 12 (3): 401-411 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-Intrusive Multi-Modal Estimation of Building Occupancy., , , , and . SenSys, page 14:1-14:14. ACM, (2017)Seeker: A bandwidth-based association control framework for wireless mesh networks., , and . Wireless Networks, 17 (5): 1287-1304 (2011)On Availability-Performability Tradeoff in Wireless Mesh Networks., , and . IEEE Trans. Mob. Comput., 14 (3): 606-618 (2015)StrLight: An Imperceptible Visible Light Communication System with String Lights., , , , and . IEEE Trans. Mob. Comput., 18 (7): 1674-1687 (2019)Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN., , , , , , , , , and . IEEE Trans. Mob. Comput., 23 (1): 941-954 (January 2024)Towards System-Level Security Analysis of IoT Using Attack Graphs., , , , , , and . IEEE Trans. Mob. Comput., 23 (2): 1142-1155 (February 2024)Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing., , , and . IEEE Trans. Mob. Comput., 13 (12): 2777-2790 (2014)Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications., , , , , , , and . IEEE Trans. Mob. Comput., 20 (10): 3066-3080 (2021)Efficient Data Capturing for Network Forensics in Cognitive Radio Networks., , and . IEEE/ACM Trans. Netw., 22 (6): 1988-2000 (2014)EIC Editorial.. IEEE Trans. Mob. Comput., 13 (7): 1393-1394 (2014)