Author of the publication

MagThief: Stealing Private App Usage Data on Mobile Devices via Built-in Magnetometer.

, , , , , , , and . SECON, page 1-9. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BitDance: Manipulating UART Serial Communication with IEMI., , , and . RAID, page 63-76. ACM, (2023)UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound., , , , and . ICPADS, page 193-200. IEEE, (2022)Blockchain: Application in the System of Teaching Informatization Management of Higher Education., , , and . SmartBlock, page 185-190. IEEE, (2020)Integrating old chinese shadow play-piying into tangible interaction (abstract only)., , , and . TEI, page 375. ACM, (2010)COF: Exploiting Concurrency for Low Power Opportunistic Forwarding., , , , , and . ICNP, page 32-42. IEEE Computer Society, (2015)DolphinAtack: Inaudible Voice Commands., , , , , and . CoRR, (2017)DoCam: depth sensing with an optical image stabilization supported RGB camera., , , , , , , , and . MobiCom, page 405-418. ACM, (2022)OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration., , , , and . ACM Trans. Sens. Networks, 16 (2): 16:1-16:28 (2020)Almost sure stability for uncertain differential equation with jumps., and . Soft Comput., 20 (2): 547-553 (2016)LeakThief: Stealing the Behavior Information of Laptop via Leakage Current., , , and . SECON, page 186-194. IEEE, (2023)