Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Natural aggregation algorithm: A new efficient metaheuristic tool for power system optimizations., , , and . SmartGridComm, page 186-192. IEEE, (2016)Speech privacy attack via vibrations from room objects leveraging a phased-MIMO radar., , , , , , , and . MobiSys, page 573-574. ACM, (2022)BioCase: Privacy Protection via Acoustic Sensing of Finger Touches on Smartphone Case Mini-Structures., , , , and . MobiSys, page 397-409. ACM, (2023)Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing., , , , , , and . INFOCOM, page 1-10. IEEE, (2021)Bipartite Graph Matching Based Secret Key Generation., , , and . INFOCOM, page 1-10. IEEE, (2021)mmECG: Monitoring Human Cardiac Cycle in Driving Environments Leveraging Millimeter Wave., , , , , , , and . INFOCOM, page 90-99. IEEE, (2022)Stealthy Backdoor Attack on RF Signal Classification., , , , , , , and . ICCCN, page 1-10. IEEE, (2023)MIXP: Efficient Deep Neural Networks Pruning for Further FLOPs Compression via Neuron Bond., , , , , , and . IJCNN, page 1-8. IEEE, (2021)Piecewise Video Condensation for Complex Scenes., , , and . ACCV Workshops (3), volume 10118 of Lecture Notes in Computer Science, page 286-300. Springer, (2016)Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards., , , , , , and . SP, page 3382-3398. IEEE, (2023)