Author of the publication

Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks.

, and . IEEE Trans. Mob. Comput., 4 (3): 297-309 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Activity-Aware Sensor Cycling for Human Activity Monitoring in Smart Homes., , , and . IEEE Communications Letters, 21 (4): 757-760 (2017)FuzzyJam: Reducing traffic jams using a fusion of fuzzy logic and vehicular networks., , and . ITSC, page 1869-1875. IEEE, (2014)A Bio-Inspired Approach to Alarm Malware Attacks in Mobile Handsets., and . IEICE Trans. Inf. Syst., 92-D (4): 742-745 (2009)Development of a lower extremity Exoskeleton Robot with a quasi-anthropomorphic design approach for load carriage., , , , , , , and . IROS, page 5345-5350. IEEE, (2015)FADES: Behavioral detection of falls using body shapes from 3D joint data., , , , and . J. Ambient Intell. Smart Environ., 7 (6): 861-877 (2015)Accurate Driver Detection Exploiting Invariant Characteristics of Smartphone Sensors., , , and . Sensors, 19 (11): 2643 (2019)Smart Gait-Aid Glasses for Parkinson's Disease Patients., , , , , , and . IEEE Trans. Biomed. Eng., 64 (10): 2394-2402 (2017)Self-Configuring Indoor Localization Based on Low-Cost Ultrasonic Range Sensors., , , and . Sensors, 14 (10): 18728-18747 (2014)A graph-based distributed reconstruction source coding with correlated messages., , and . IEEE Communications Letters, 14 (4): 345-347 (2010)Classifying children with 3D depth cameras for enabling children's safety applications., , , , , and . UbiComp, page 343-347. ACM, (2014)