Author of the publication

We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones.

, , and . IEEE Trans. Information Forensics and Security, 12 (2): 286-297 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preface., and . J. Comput. Sci. Technol., 23 (2): 165 (2008)Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks., , and . GLOBECOM, page 453-457. IEEE, (2007)Symbol Timing Estimation with Multi-h CPM Signals., , and . JNW, 9 (4): 921-926 (2014)ChipInfo: software for extracting gene annotation and gene ontology information for microarray analysis., , and . Nucleic Acids Research, 31 (13): 3483-3486 (2003)Weighted Low-rank Tensor Recovery for Hyperspectral Image Restoration., , , , and . CoRR, (2017)Privacy-preserving Network Functionality Outsourcing., , and . CoRR, (2015)Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt., , , , and . IEEE Access, (2018)TagSmart: analysis and visualization for yeast mutant fitness data measured by tag microarrays., , , , , and . BMC Bioinformatics, (2007)Approximate Capacities of Two-Dimensional Codes by Spatial Mixing., , and . CoRR, (2014)We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones., , and . IEEE Trans. Information Forensics and Security, 12 (2): 286-297 (2017)