Author of the publication

Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation.

, , , , , , , , and . J. Comput. Sci. Technol., 29 (4): 589-604 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Locating sensors in the forest: A case study in GreenOrbs., , , , , , , , , and . INFOCOM, page 1026-1034. IEEE, (2012)Human object estimation via backscattered radio frequency signal., , , , , , and . INFOCOM, page 1652-1660. IEEE, (2015)VADS: Visual attention detection with a smartphone., , , , , , , , and . INFOCOM, page 1-9. IEEE, (2016)CBID: A Customer Behavior Identification System Using Passive Tags., , , , , , , and . IEEE/ACM Trans. Netw., 24 (5): 2885-2898 (2016)Mapping Services to Activities in Service Oriented Architecture (SOA) Design: A Simulation-Driven Optimizing Method Based on DODAF2.0., , , and . SOSE, page 156-157. IEEE Computer Society, (2014)Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information, , , , and . CoRR, (2012)Accelerating Crowdsourcing Based Indoor Localization Using CSI., , , , , , and . ICPADS, page 274-281. IEEE Computer Society, (2015)A fine-grained indoor localization using multidimensional Wi-Fi fingerprinting., , , , , , , , and . ICPADS, page 494-501. IEEE Computer Society, (2014)CBID: A Customer Behavior Identification System Using Passive Tags., , , , , , , and . ICNP, page 47-58. IEEE Computer Society, (2014)PHYAlert: identity spoofing attack detection and prevention for a wireless edge network., , , , and . J. Cloud Computing, (2020)