关注
Lili Zhang
Lili Zhang
在 asu.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Decomposing joint distortion for adaptive steganography
W Zhang, Z Zhang, L Zhang, H Li, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 27 (10), 2274 …, 2016
1092016
Deep learning-guided jamming for cross-technology wireless networks: Attack and defense
D Han, A Li, L Zhang, Y Zhang, J Li, T Li, T Zhu, Y Zhang
IEEE/ACM Transactions on Networking 29 (5), 1922-1932, 2021
192021
Magauth: Secure and usable two-factor authentication with magnetic wrist wearables
Y Zhang, D Han, A Li, L Zhang, T Li, Y Zhang
IEEE Transactions on Mobile Computing 22 (1), 311-327, 2021
62021
WristUnlock: Secure and usable smartphone unlocking with wrist wearables
L Zhang, D Han, A Li, T Li, Y Zhang, Y Zhang
2019 IEEE Conference on Communications and Network Security (CNS), 28-36, 2019
42019
(In) secure acoustic mobile authentication
D Han, A Li, T Li, L Zhang, Y Zhang, J Li, R Zhang, Y Zhang
IEEE Transactions on Mobile Computing 21 (9), 3193-3207, 2021
22021
Socialdistance: How far are you from verified users in online social media?
A Li, T Li, Y Zhang, L Zhang, Y Zhang
Proceedings of the International Symposium on Quality of Service, 1-10, 2019
22019
系统目前无法执行此操作,请稍后再试。
文章 1–6