Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Human object estimation via backscattered radio frequency signal., , , , , , and . INFOCOM, page 1652-1660. IEEE, (2015)Locating sensors in the forest: A case study in GreenOrbs., , , , , , , , , and . INFOCOM, page 1026-1034. IEEE, (2012)VADS: Visual attention detection with a smartphone., , , , , , , , and . INFOCOM, page 1-9. IEEE, (2016)CBID: A Customer Behavior Identification System Using Passive Tags., , , , , , , and . IEEE/ACM Trans. Netw., 24 (5): 2885-2898 (2016)CBID: A Customer Behavior Identification System Using Passive Tags., , , , , , , and . ICNP, page 47-58. IEEE Computer Society, (2014)Mapping Services to Activities in Service Oriented Architecture (SOA) Design: A Simulation-Driven Optimizing Method Based on DODAF2.0., , , and . SOSE, page 156-157. IEEE Computer Society, (2014)Accelerating Crowdsourcing Based Indoor Localization Using CSI., , , , , , and . ICPADS, page 274-281. IEEE Computer Society, (2015)A fine-grained indoor localization using multidimensional Wi-Fi fingerprinting., , , , , , , , and . ICPADS, page 494-501. IEEE Computer Society, (2014)Leveraging Topic Model for CSI Based Human Activity Recognition., , , , , , and . MSN, page 23-30. IEEE Computer Society, (2016)Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information, , , , and . CoRR, (2012)