Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NLOS Identification and Weighted Least-Squares Localization for UWB Systems Using Multipath Channel Statistics., , , and . EURASIP J. Adv. Signal Process., (2008)Recovery Method for Ransomware Encryption Attacks with File Extension Changing on File Server., , , and . ICMU, page 1-4. IEEE, (2023)Variable interval positioning method for smartphone-based power-saving geofencing., , , , , , and . PIMRC, page 3482-3486. IEEE, (2013)Optimizing user interaction for mobile web browsing., , and . Mobile HCI, ACM, (2009)Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image Classification., , , and . COMPSAC, page 940-945. IEEE, (2023)Dynamic test input generation for web applications., , , , , and . ISSTA, page 249-260. ACM, (2008)A pedestrian passage detection method by using spinning magnets on corridors., , , , , , and . UbiComp/ISWC Adjunct, page 411-414. ACM, (2015)Formal Specification and Analysis of Timing Properties in Software Systems., , , , and . FASE, volume 5503 of Lecture Notes in Computer Science, page 262-277. Springer, (2009)A method for distinction of bicycle traffic violations by detection of cyclists' behavior using multi-sensors., , , and . MobiQuitous, page 75-83. ACM, (2016)Spurious Timeout Detection Algorithm for Mobile Communication with Delay Jitter., , and . Inf. Media Technol., 1 (1): 503-513 (2006)