暂无分享,去创建一个
[1] Jure Leskovec,et al. Inferring Person-to-person Proximity Using WiFi Signals , 2016, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[2] Stefan Schmid,et al. Using consumer LED light bulbs for low-cost visible light communication systems , 2014, VLCS@MobiCom.
[3] Waldir Moreira,et al. CRAWDAD dataset copelabs/usense (v.2017-01-27) , 2017 .
[4] Stephan Sigg,et al. Secure Communication Based on Ambient Audio , 2013, IEEE Transactions on Mobile Computing.
[5] Jörg Ott,et al. LocalVLC: Augmenting Smart IoT Services with Practical Visible Light Communication , 2019, 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[6] Ciprian Dobre,et al. CRAWDAD dataset upb/hyccups (v.2016-10-17) , 2016 .
[7] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[8] Ahmad-Reza Sadeghi,et al. Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices , 2014, CCS.
[9] Per A. Hallgren,et al. InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).
[10] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[11] Tadayoshi Kohno,et al. Consumer Smart Homes: Where We Are and Where We Need to Go , 2019, HotMobile.
[12] Pan Hui,et al. Spatial Interference Detection for Mobile Visible Light Communication , 2017, 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[13] Chenyu Huang,et al. Lightweight Visible Light Positioning for Wearables , 2015, GETMBL.
[14] Qian Zhang,et al. Wearables Can Afford: Light-weight Indoor Positioning with Visible Light , 2015, MobiSys.
[15] Damith Chinthana Ranasinghe,et al. RFID Light Bulb , 2017, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[16] René Mayrhofer,et al. A Survey of User Interaction for Spontaneous Device Association , 2014, CSUR.
[17] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[18] Pan Hui,et al. OPENRP: a reputation middleware for opportunistic crowd computing , 2016, IEEE Communications Magazine.
[19] Stefan Schmid,et al. Linux Light Bulbs: Enabling Internet Protocol Connectivity for Light Bulb Networks , 2015, VLCS@MobiCom.
[20] René Mayrhofer,et al. Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.
[21] Ngu Nguyen,et al. Moves like Jagger: Exploiting variations in instantaneous gait for spontaneous device pairing , 2018, Pervasive Mob. Comput..
[22] Andreas W. Kempa-Liehr,et al. Time Series FeatuRe Extraction on basis of Scalable Hypothesis tests (tsfresh - A Python package) , 2018, Neurocomputing.
[23] Leon Cohen,et al. Generalization of the Wiener-Khinchin theorem , 1998, IEEE Signal Processing Letters.
[24] Hans-Werner Gellersen,et al. How groups of users associate wireless devices , 2013, CHI.
[25] Rong Jin,et al. MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers , 2016, IEEE Transactions on Information Forensics and Security.
[26] Eyal de Lara,et al. Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.
[27] Prabal Dutta,et al. Luxapose: indoor positioning with mobile phones and visible light , 2014, MobiCom.
[28] LloretJaime,et al. Seamless Outdoors-Indoors Localization Solutions on Smartphones , 2016 .
[29] Nathaniel S. Borenstein,et al. IBM ® , 2009 .