-
1
-
-
49149086533
-
Cardinality estimation for largescale RFID systems
-
C. Qian, H.-L. Ngan, and Y. Liu, "Cardinality estimation for largescale RFID systems, " in Proc. IEEE PerCom, 2008, pp. 30-39.
-
(2008)
Proc. IEEE PerCom
, pp. 30-39
-
-
Qian, C.1
Ngan, H.-L.2
Liu, Y.3
-
2
-
-
77955886382
-
ASAP: Scalable identification and counting for contactless RFID systems
-
C. Qian, Y. Liu, H.-L. Ngan, and L. M. Ni, "ASAP: Scalable identification and counting for contactless RFID systems, " in Proc. IEEE ICDCS, 2010, pp. 52-61.
-
(2010)
Proc. IEEE ICDCS
, pp. 52-61
-
-
Qian, C.1
Liu, Y.2
Ngan, H.-L.3
Ni, L.M.4
-
3
-
-
80051893916
-
PET: Probabilistic estimating tree for large-scale RFID estimation
-
Y. Zheng, M. Li, and C. Qian, "PET: Probabilistic estimating tree for large-scale RFID estimation, " in Proc. IEEE ICDCS, 2011, pp. 37-46.
-
(2011)
Proc. IEEE ICDCS
, pp. 37-46
-
-
Zheng, Y.1
Li, M.2
Qian, C.3
-
4
-
-
79957668373
-
Identification-free batch authentication for RFID tags
-
L. Yang, J. Han, Y. Qi, and Y. Liu, "Identification-free batch authentication for RFID tags, " in Proc. IEEE ICNP, 2010, pp. 154-163.
-
(2010)
Proc. IEEE ICNP
, pp. 154-163
-
-
Yang, L.1
Han, J.2
Qi, Y.3
Liu, Y.4
-
6
-
-
84920054459
-
CBID: A customer behavior identification system using passive tags
-
J. Han et al., "CBID: A customer behavior identification system using passive tags, " in Proc. IEEE ICNP, 2014, pp. 47-58.
-
(2014)
Proc. IEEE ICNP
, pp. 47-58
-
-
Han, J.1
-
7
-
-
84904431197
-
Twins: Device-free object tracking using passive tags
-
J. Han et al., "Twins: Device-free object tracking using passive tags, " in Proc. IEEE INFOCOM, 2014, pp. 469-476.
-
(2014)
Proc. IEEE INFOCOM
, pp. 469-476
-
-
Han, J.1
-
8
-
-
84911440471
-
Sherlock: Micro-environment sensing for smartphones
-
Dec
-
Z. Yang et al., "Sherlock: Micro-environment sensing for smartphones, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 12, pp. 3295C-3305C, Dec. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.12
, pp. 3295C-3305C
-
-
Yang, Z.1
-
9
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures, " in Proc. ACM MobiCom, 2008, pp. 116-127.
-
(2008)
Proc. ACM MobiCom
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
10
-
-
78649313774
-
Physical-layer identification of UHF RFID tags
-
D. Zanetti, B. Danev, and S. Capkun, "Physical-layer identification of UHF RFID tags, " in Proc. ACM MobiCom, 2010, pp. 353-364.
-
(2010)
Proc. ACM MobiCom
, pp. 353-364
-
-
Zanetti, D.1
Danev, B.2
Capkun, S.3
-
11
-
-
79961201364
-
On the practicality of UHF RFID fingerprinting: How real is the RFID tracking problem?
-
D. Zanetti, P. Sachs, and S. Capkun, "On the practicality of UHF RFID fingerprinting: How real is the RFID tracking problem?, " in Proc. ACM PETS, 2011, pp. 97-116.
-
(2011)
Proc. ACM PETS
, pp. 97-116
-
-
Zanetti, D.1
Sachs, P.2
Capkun, S.3
-
14
-
-
84871231488
-
On physical-layer identification of wireless devices
-
B. Danev, D. Zanetti, and S. Capkun, "On physical-layer identification of wireless devices, " Comput. Surv., vol. 45, no. 1, pp. 6:1-6:29, 2012.
-
(2012)
Comput. Surv
, vol.45
, Issue.1
, pp. 61-629
-
-
Danev, B.1
Zanetti, D.2
Capkun, S.3
-
15
-
-
80052902499
-
Fingerprinting RFID tags
-
Nov.-Dec
-
S. Periaswamy, D. Thompson, and J. Di, "Fingerprinting RFID tags, " IEEE Trans. Depend. Secure Comput., vol. 8, no. 6, pp. 938-943, Nov.-Dec. 2011.
-
(2011)
IEEE Trans. Depend. Secure Comput
, vol.8
, Issue.6
, pp. 938-943
-
-
Periaswamy, S.1
Thompson, D.2
Di, J.3
-
16
-
-
78649288907
-
A " Gen 2" RFID monitor based on the USRP
-
M. Buettner and D. Wetherall, "A "Gen 2" RFID monitor based on the USRP, " in Proc. ACM SIGCOMM, 2010, pp. 41-47.
-
(2010)
Proc. ACM SIGCOMM
, pp. 41-47
-
-
Buettner, M.1
Wetherall, D.2
-
18
-
-
48149093703
-
Detecting hidden messages using image power spectrum
-
P. Amin and K. P. Subbalakshmi, "Detecting hidden messages using image power spectrum, " in Proc. IEEE Int. Conf. Image Process., 2007, vol. 1, pp. 421-424.
-
(2007)
Proc. IEEE Int. Conf. Image Process
, vol.1
, pp. 421-424
-
-
Amin, P.1
Subbalakshmi, K.P.2
-
19
-
-
0001634204
-
On a method of investigating periodicities in disturbed series, with special reference to Wolfer's sunspot numbers
-
U. G. Yule, "On a method of investigating periodicities in disturbed series, with special reference to Wolfer's sunspot numbers, " Philos. Trans. Royal Soc., vol. 226, pp. 267-298, 1927.
-
(1927)
Philos. Trans. Royal Soc
, vol.226
, pp. 267-298
-
-
Yule, U.G.1
-
20
-
-
0001189477
-
On periodicity in series of related terms
-
G. Walker, "On periodicity in series of related terms, " in Proc. Royal Soc., 1931, vol. 131, pp. 518-532.
-
(1931)
Proc. Royal Soc
, vol.131
, pp. 518-532
-
-
Walker, G.1
-
21
-
-
84896802040
-
GenePrint: Generic and accurate physical-layer identification for UHF RFID tags
-
D. Ma, C. Qian, W. Li, J. Han, and J. Zhao, "GenePrint: Generic and accurate physical-layer identification for UHF RFID tags, " in Proc. IEEE ICNP, 2013, pp. 1-10.
-
(2013)
Proc. IEEE ICNP
, pp. 1-10
-
-
Ma, D.1
Qian, C.2
Li, W.3
Han, J.4
Zhao, J.5
-
22
-
-
84873990387
-
Localization of wireless sensor networks in the wild: Pursuit of ranging quality
-
Feb
-
J. Zhao et al., "Localization of wireless sensor networks in the wild: Pursuit of ranging quality, " IEEE/ACM Trans. Netw., vol. 21, no. 1, pp. 311-323, Feb. 2013.
-
(2013)
IEEE/ACM Trans. Netw
, vol.21
, Issue.1
, pp. 311-323
-
-
Zhao, J.1
-
23
-
-
77949813277
-
-
New York, NY, USA: Academic
-
G. Franceschetti and S. Stornelli, Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control. New York, NY, USA: Academic, 2006.
-
(2006)
Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control
-
-
Franceschetti, G.1
Stornelli, S.2
-
24
-
-
77952407534
-
Attacks on physical-layer identification
-
B. Danev, H. Luecken, S. Capkun, and K. El Defrawy, "Attacks on physical-layer identification, " in Proc. ACM WiSec, 2010, pp. 89-98.
-
(2010)
Proc. ACM WiSec
, pp. 89-98
-
-
Danev, B.1
Luecken, H.2
Capkun, S.3
El Defrawy, K.4
-
25
-
-
84896792198
-
-
[Online]
-
M. Buettner, "Gen 2 RFID Tools, " 2010 [Online]. Available: https:// www.cgran.org/wiki/Gen2
-
(2010)
Gen 2 RFID Tools
-
-
Buettner, M.1
-
26
-
-
84872114018
-
Towards practical identification of HF RFID devices
-
B. Danev, S. Capkun, R. J. Masti, and T. S. Benjamin, "Towards practical identification of HF RFID devices, " Trans. Inf. Syst. Security, vol. 15, no. 2, pp. 7:1-7:24, 2012.
-
(2012)
Trans. Inf. Syst. Security
, vol.15
, Issue.2
, pp. 71-724
-
-
Danev, B.1
Capkun, S.2
Masti, R.J.3
Benjamin, T.S.4
-
27
-
-
84883067259
-
P-MTI: Physical-layer missing tag identification via compressive sensing
-
Y. Zheng and M. Li, "P-MTI: Physical-layer missing tag identification via compressive sensing, " in Proc. IEEE INFOCOM, 2013, pp. 917-925.
-
(2013)
Proc. IEEE INFOCOM
, pp. 917-925
-
-
Zheng, Y.1
Li, M.2
-
28
-
-
77953888175
-
Accurate localization of RFID tags using phase difference
-
C. Hekimian-Williams, B. Grant, X. Liu, Z. Zhang, and P. Kumar, "Accurate localization of RFID tags using phase difference, " in Proc. IEEE RFID, 2010, pp. 89-96.
-
(2010)
Proc. IEEE RFID
, pp. 89-96
-
-
Hekimian-Williams, C.1
Grant, B.2
Liu, X.3
Zhang, Z.4
Kumar, P.5
-
29
-
-
84866484463
-
Efficient and reliable low-power backscatter networks
-
J. Wang, H. Hassanieh, D. Katabi, and P. Indyk, "Efficient and reliable low-power backscatter networks, " in Proc. ACM SIGCOMM, 2012, pp. 61-72.
-
(2012)
Proc. ACM SIGCOMM
, pp. 61-72
-
-
Wang, J.1
Hassanieh, H.2
Katabi, D.3
Indyk, P.4
-
30
-
-
84864377086
-
BLINK: A high throughput link layer for backscatter communication
-
P. Zhang, J. Gummeson, and D. Ganesan, "BLINK: A high throughput link layer for backscatter communication, " in Proc. ACM MobiSys, 2012, pp. 99-112.
-
(2012)
Proc. ACM MobiSys
, pp. 99-112
-
-
Zhang, P.1
Gummeson, J.2
Ganesan, D.3
-
31
-
-
84866621052
-
Every bit counts: Fast and scalable RFID estimation
-
M. Shahzad and A. X. Liu, "Every bit counts: Fast and scalable RFID estimation, " in Proc. ACM Mobicom, 2012, pp. 365-376.
-
(2012)
Proc. ACM Mobicom
, pp. 365-376
-
-
Shahzad, M.1
Liu, A.X.2
-
32
-
-
84861619902
-
Sensing-enabled Defenses to RFID unauthorized reading and relay attacks without changing the usage model
-
T. Halevi et al., "Sensing-enabled Defenses to RFID unauthorized reading and relay attacks without changing the usage model, " in Proc. IEEE PerCom, 2012, pp. 227-234.
-
(2012)
Proc. IEEE PerCom
, pp. 227-234
-
-
Halevi, T.1
|