Author of the publication

FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting.

, , , , , , and . AsiaCCS, page 261-272. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenge-Response Authentication Using In-Air Handwriting Style Verification., , , and . IEEE Trans. Dependable Secur. Comput., 17 (1): 51-64 (2020)DepthFake: Spoofing 3D Face Authentication with a 2D Photo., , , , and . SP, page 917-91373. IEEE, (2023)WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens., , , , , , and . SP, page 984-1001. IEEE, (2022)OutletSpy: cross-outlet application inference via power factor correction signal., , , , , and . WISEC, page 181-191. ACM, (2021)Design of two MUSIC-like estimators based on bias minimization., and . IEEE Trans. Signal Process., 44 (9): 2284-2299 (1996)Comparative study of the biases of MUSIC-like estimators., and . Signal Process., 50 (1-2): 39-55 (1996)MC2: Multimode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring., , , , and . ACM Trans. Sens. Networks, 10 (3): 52:1-52:30 (2014)Channel surfing: defending wireless sensor networks from jamming and interference., , and . SenSys, page 403-404. ACM, (2006)Lightweight secure communication protocols for in-vehicle sensor networks., , , and . CyCAR@CCS, page 19-30. ACM, (2013)ACMNet: Adaptive Confidence Matching Network for Human Behavior Analysis via Cross-modal Retrieval., , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 16 (1s): 27:1-27:21 (2020)