Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving robust wireless localization resilient to signal strength attacks., , , and . Wireless Networks, 18 (1): 45-58 (2012)Exploiting various information for knowledge element relation recognition., , , , and . GrC, page 565-571. IEEE Computer Society, (2009)An Algorithm Based on the Standard Deviation of Passive Microwave Brightness Temperatures for Monitoring Soil Surface Freeze/Thaw State on the Tibetan Plateau., , , , , , , , , and . IEEE Trans. Geoscience and Remote Sensing, 53 (5): 2775-2783 (2015)Measuring human queues using WiFi signals., , , , , and . MobiCom, page 235-238. ACM, (2013)VIRO: A scalable, robust and namespace independent virtual Id routing for future networks., , and . INFOCOM, page 2381-2389. IEEE, (2011)Securing Mobile Location-based Services through position verification leveraging key distribution., , , , , and . WCNC, page 2694-2699. IEEE, (2012)Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching., , , and . GLOBECOM, page 1-6. IEEE, (2011)Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing., , , and . GLOBECOM, page 594-600. IEEE, (2014)Smartphone based user verification leveraging gait recognition for mobile healthcare systems., , , and . SECON, page 149-157. IEEE, (2013)Tracking vehicular speed variations by warping mobile phone signal strengths., , , , , , and . PerCom, page 213-221. IEEE, (2011)