Author of the publication

Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping.

, , , , , , and . CCS, page 239-252. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MUSE-Fi: Contactless MUti-person SEnsing Exploiting Near-field Wi-Fi Channel Variation., , , , and . MobiCom, page 75:1-75:15. ACM, (2023)SiWa: see into walls via deep UWB radar., , , , , and . MobiCom, page 323-336. ACM, (2021)Fuzzy Logic Based Network Reconfiguration Strategy During Power System Restoration., , , , , , and . IEEE Syst. J., 16 (3): 4735-4743 (2022)Quantifying the Physical Separability of RF-Based Multi-Person Respiration Monitoring via SINR., , , , and . SenSys, page 47-60. ACM, (2022)Integrating monostatic sensing with communication for IoT., , , , , , and . ISACom@MobiCom, page 43-48. ACM, (2022)Cross-Age LFW: A Database for Studying Cross-Age Face Recognition in Unconstrained Environments., , and . CoRR, (2017)HoloFed: Environment-Adaptive Positioning via Multi-band Reconfigurable Holographic Surfaces and Federated Learning., , , , and . CoRR, (2023)Sound of Motion: Real-time Wrist Tracking with A Smart Watch-Phone Pair., , , and . INFOCOM, page 110-119. IEEE, (2022)CNN-Based Age Classification via Transfer Learning., , , and . IScIDE, volume 10559 of Lecture Notes in Computer Science, page 161-168. Springer, (2017)RF-Based Human Activity Recognition Using Signal Adapted Convolutional Neural Network., , , , , and . CoRR, (2021)