Decomposing joint distortion for adaptive steganography W Zhang, Z Zhang, L Zhang, H Li, N Yu IEEE Transactions on Circuits and Systems for Video Technology 27 (10), 2274 …, 2016 | 109 | 2016 |
Deep learning-guided jamming for cross-technology wireless networks: Attack and defense D Han, A Li, L Zhang, Y Zhang, J Li, T Li, T Zhu, Y Zhang IEEE/ACM Transactions on Networking 29 (5), 1922-1932, 2021 | 19 | 2021 |
Magauth: Secure and usable two-factor authentication with magnetic wrist wearables Y Zhang, D Han, A Li, L Zhang, T Li, Y Zhang IEEE Transactions on Mobile Computing 22 (1), 311-327, 2021 | 6 | 2021 |
WristUnlock: Secure and usable smartphone unlocking with wrist wearables L Zhang, D Han, A Li, T Li, Y Zhang, Y Zhang 2019 IEEE Conference on Communications and Network Security (CNS), 28-36, 2019 | 4 | 2019 |
(In) secure acoustic mobile authentication D Han, A Li, T Li, L Zhang, Y Zhang, J Li, R Zhang, Y Zhang IEEE Transactions on Mobile Computing 21 (9), 3193-3207, 2021 | 2 | 2021 |
Socialdistance: How far are you from verified users in online social media? A Li, T Li, Y Zhang, L Zhang, Y Zhang Proceedings of the International Symposium on Quality of Service, 1-10, 2019 | 2 | 2019 |