SmartLens: sensing eye activities using zero-power contact lens. | 0 | 0.34 | 2022 |
Plant Keeper: Towards Wireless Sensing to Ion Transmission of Plants | 0 | 0.34 | 2021 |
CS-GAN: Cross-Structure Generative Adversarial Networks for Chinese calligraphy translation | 1 | 0.35 | 2021 |
A Vibration-Based Multi-User Concurrent Communication System With Commercial Devices | 0 | 0.34 | 2021 |
PRComm: Anti-Interference Cross-Technology Communication Based on Pseudo-random Sequence | 0 | 0.34 | 2021 |
Parallel Backscatter in the Wild: When Burstiness and Randomness Play With You | 0 | 0.34 | 2021 |
dWatch: A Reliable and Low-Power Drowsiness Detection System for Drivers Based on Mobile Devices | 1 | 0.35 | 2020 |
Using Generative Adversarial Networks to Break and Protect Text Captchas | 0 | 0.34 | 2020 |
Semantics-Aware Obfuscation Scheme Prediction For Binary | 0 | 0.34 | 2020 |
Monostatic MIMO Backscatter Communications | 1 | 0.34 | 2020 |
Compile-time Code Virtualization for Android Applications | 0 | 0.34 | 2020 |
WideSee: towards wide-area contactless wireless sensing | 6 | 0.43 | 2019 |
WisDriver:A WiFi and Smartphone Sensing System for Safely Driving | 0 | 0.34 | 2019 |
Towards wide-area contactless human sensing: poster abstract | 0 | 0.34 | 2019 |
Tagtag: material sensing with commodity RFID | 5 | 0.43 | 2019 |
Material Identification and Target Imaging with RFIDs [IoT Connection]. | 0 | 0.34 | 2018 |
Low Human-Effort, Device-Free Localization with Fine-Grained Subcarrier Information. | 4 | 0.42 | 2018 |
Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery. | 0 | 0.34 | 2018 |
Face detection of golden monkeys via regional color quantization and incremental self-paced curriculum learning. | 0 | 0.34 | 2018 |
2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster Rescue | 1 | 0.40 | 2018 |
iGuard: A real-time anti-theft system for smartphones. | 2 | 0.36 | 2018 |
Enabling robust and reliable transmission in Internet of Things with multiple gateways. | 0 | 0.34 | 2018 |
Material Identification with Commodity Wi-Fi Devices. | 0 | 0.34 | 2018 |
Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. | 10 | 0.86 | 2018 |
cDeepArch: A Compact Deep Neural Network Architecture for Mobile Sensing | 0 | 0.34 | 2018 |
PLoRa: a passive long-range data network from ambient LoRa transmissions. | 35 | 1.00 | 2018 |
Efficient Network Coding with Interference-Awareness and Neighbor States Updating in Wireless Networks. | 0 | 0.34 | 2017 |
A Study of Pattern Prediction in the Monitoring Data of Earthen Ruins with the Internet of Things. | 0 | 0.34 | 2017 |
AppIS: Protect Android Apps Against Runtime Repackaging Attacks | 1 | 0.35 | 2017 |
Unsupervised 2D Dimensionality Reduction with Adaptive Structure Learning. | 6 | 0.51 | 2017 |
FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas. | 13 | 0.50 | 2017 |
Cracking Android Pattern Lock in Five Attempts. | 12 | 0.52 | 2017 |
Protect Sensitive Information against Channel State Information Based Attacks | 1 | 0.35 | 2017 |
E-HIPA: An Energy-Efficient Framework for High-Precision Multi-Target-Adaptive Device-Free Localization. | 11 | 0.49 | 2017 |
D-Watch: Embracing "bad" Multipaths for Device-Free Localization with COTS RFID Devices. | 27 | 0.83 | 2017 |
SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation | 1 | 0.35 | 2017 |
SpeAR: A Fast AR System with High Accuracy Deployed on Mobile Devices | 0 | 0.34 | 2017 |
TagScan: Simultaneous Target Imaging and Material Identification with Commodity RFID Devices. | 30 | 1.06 | 2017 |
Exploit Dynamic Data Flows To Protect Software Against Semantic Attacks | 0 | 0.34 | 2017 |
Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization | 0 | 0.34 | 2017 |
Smoggy-Link: Fingerprinting interference for predictable wireless concurrency | 1 | 0.35 | 2016 |
DEDV: A Data Collection Method for Mobile Sink Based on Dynamic Estimation of Data Value in WSN | 3 | 0.41 | 2016 |
Node Immunization with Time-Sensitive Restrictions. | 1 | 0.36 | 2016 |
DualSync: Taming clock skew variation for synchronization in low-power wireless networks | 3 | 0.38 | 2016 |
A Data Cleaning Method and Its Application for Earthen Site Data Monitored by WSN. | 0 | 0.34 | 2016 |
Graphic-based character grouping in topographic maps. | 2 | 0.35 | 2016 |
Watch Traffic in the Sky: A Method for Path Selection in Packet Transmission between V2V from Macro Perspective | 1 | 0.37 | 2016 |
Dynamic character grouping based on four consistency constraints in topographic maps. | 1 | 0.34 | 2016 |
FISCP: fine-grained device-free positioning system for multiple targets working in sparse deployments. | 2 | 0.39 | 2016 |
DE 2: localization based on the rotating RSS using a single beacon. | 1 | 0.35 | 2016 |