The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels. | 1 | 0.38 | 2017 |
Devising geographic diffusion for drone networks | 0 | 0.34 | 2016 |
Securing mobile access with interactive image code and image key encryption. | 0 | 0.34 | 2016 |
Constructing A Reliable And Fast Recoverable Network For Drones | 2 | 0.48 | 2016 |
Poster: A Multi-Drone Platform for Empowering Drones' Teamwork | 4 | 0.63 | 2015 |
Poster: Swarming Drones Can Connect You to the Network | 3 | 0.53 | 2015 |