Segui
Lili Zhang
Titolo
Citata da
Citata da
Anno
Decomposing joint distortion for adaptive steganography
W Zhang, Z Zhang, L Zhang, H Li, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 27 (10), 2274 …, 2016
992016
Deep learning-guided jamming for cross-technology wireless networks: Attack and defense
D Han, A Li, L Zhang, Y Zhang, J Li, T Li, T Zhu, Y Zhang
IEEE/ACM Transactions on Networking 29 (5), 1922-1932, 2021
132021
Magauth: Secure and usable two-factor authentication with magnetic wrist wearables
Y Zhang, D Han, A Li, L Zhang, T Li, Y Zhang
IEEE Transactions on Mobile Computing 22 (1), 311-327, 2021
52021
(In) secure acoustic mobile authentication
D Han, A Li, T Li, L Zhang, Y Zhang, J Li, R Zhang, Y Zhang
IEEE Transactions on Mobile Computing 21 (9), 3193-3207, 2021
22021
Socialdistance: How far are you from verified users in online social media?
A Li, T Li, Y Zhang, L Zhang, Y Zhang
Proceedings of the International Symposium on Quality of Service, 1-10, 2019
22019
WristUnlock: Secure and usable smartphone unlocking with wrist wearables
L Zhang, D Han, A Li, T Li, Y Zhang, Y Zhang
2019 IEEE Conference on Communications and Network Security (CNS), 28-36, 2019
22019
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–6