Author of the publication

ZiFi: Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery.

, , , , , and . IEEE Trans. Mob. Comput., 13 (11): 2675-2688 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Channel Interference Measurement and Modeling in Low-Power Wireless Networks., , , , , and . RTSS, page 248-257. IEEE Computer Society, (2009)Fidelity-Aware Utilization Control for Cyber-Physical Surveillance Systems., , , , and . RTSS, page 117-126. IEEE Computer Society, (2010)Exploiting sensing diversity for confident sensing in wireless sensor networks., , , and . INFOCOM, page 1719-1727. IEEE, (2011)BlueID: A practical system for Bluetooth device identification., , and . INFOCOM, page 2849-2857. IEEE, (2014)Unleashing exposed terminals in enterprise WLANs: A rate adaptation approach., , and . INFOCOM, page 2481-2489. IEEE, (2014)VINCE: Exploiting visible light sensing for smartphone-based NFC systems., , , , and . INFOCOM, page 2722-2730. IEEE, (2015)Real-Time Power Profiling of Narrowband Internet of Things Networks., , , , , and . SIGCOMM Posters and Demos, page 90-92. ACM, (2019)Poster: A Robust Method for Heart Rate Estimation Using Wrist-type PPG Signals., , , , and . EWSN, page 218-219. ACM, (2019)Coalition-Based Cooperative Routing in Cognitive Radio Networks., , and . ICCCN, page 1-9. IEEE, (2018)Training Opinion Leaders in Microblog: A Game Theory Approach., , , and . CGC, page 754-759. IEEE Computer Society, (2012)