Author of the publication

Arbitrator2.0: Preventing Unauthorized Access on Passive Tags.

, , , , , , and . IEEE Trans. Mob. Comput., 21 (3): 835-848 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crossover transition in the Fluctuation of Internet., , , and . CoRR, (2015)Gravity Model for Transportation Network Based on Optimal Expected Traffic., and . Complex (1), volume 4 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 514-524. Springer, (2009)Self-Supervised Image Representation Learning: Transcending Masking with Paired Image Overlay., , and . CoRR, (2023)Optimization of manipulator dynamics in non extreme design case., and . Robotica, 8 (2): 131-136 (1990)Estimating the State of Health for Lithium-ion Batteries: A Particle Swarm Optimization-Assisted Deep Domain Adaptation Approach., , , , , , and . IEEE CAA J. Autom. Sinica, 10 (7): 1530-1543 (2023)Hollow Receiving Coil and Single Turn Element Analysis on Power for Wireless Capsule Endoscopy., , , , and . J. Medical Imaging Health Informatics, 10 (11): 2714-2721 (2020)High-performance tooth flank collaborative optimization model for spiral bevel and hypoid gears., , , , , , and . Adv. Eng. Informatics, (August 2023)Cascaded proportional-integral-derivative controller parameters tuning for contour following improvement., , , and . J. Syst. Control. Eng., 230 (9): 892-904 (2016)Laparoscopic Image-Based Critical Action Recognition and Anticipation With Explainable Features., , , , , , , and . IEEE J. Biomed. Health Informatics, 27 (11): 5393-5404 (November 2023)Simultaneous optimization of tool path and shape for five-axis flank milling., , and . Comput. Aided Des., 44 (12): 1229-1234 (2012)