Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays Y Liu, Y Zhao, L Chen, J Pei, J Han IEEE Transactions on Parallel and Distributed Systems 23 (11), 2138-2149, 2011 | 272 | 2011 |
Twins: Device-free object tracking using passive tags J Han, C Qian, X Wang, D Ma, J Zhao, W Xi, Z Jiang, Z Wang IEEE/ACM Transactions on Networking 24 (3), 1605-1617, 2015 | 176 | 2015 |
Dynamic key-updating: Privacy-preserving authentication for RFID systems L Lu, J Han, L Hu, LM Ni International Journal of Distributed Sensor Networks 8 (5), 153912, 2012 | 160 | 2012 |
Cbid: A customer behavior identification system using passive tags J Han, H Ding, C Qian, W Xi, Z Wang, Z Jiang, L Shangguan, J Zhao IEEE/ACM Transactions on Networking 24 (5), 2885-2898, 2015 | 130 | 2015 |
GenePrint: Generic and accurate physical-layer identification for UHF RFID tags J Han, C Qian, P Yang, D Ma, Z Jiang, W Xi, J Zhao IEEE/ACM Transactions on Networking 24 (2), 846-858, 2015 | 113 | 2015 |
Pseudo trust: Zero-knowledge authentication in anonymous P2Ps L Lu, J Han, Y Liu, L Hu, JP Huai, L Ni, J Ma IEEE Transactions on Parallel and Distributed Systems 19 (10), 1325-1337, 2008 | 109 | 2008 |
Identification-free batch authentication for RFID tags L Yang, J Han, Y Qi, Y Liu The 18th IEEE International Conference on Network Protocols, 154-163, 2010 | 100 | 2010 |
Rejecting the attack: Source authentication for wi-fi management frames using csi information Z Jiang, J Zhao, XY Li, J Han, W Xi 2013 Proceedings IEEE INFOCOM, 2544-2552, 2013 | 99 | 2013 |
KEEP: Fast secret key extraction protocol for D2D communication W Xi, XY Li, C Qian, J Han, S Tang, J Zhao, K Zhao 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 350-359, 2014 | 94 | 2014 |
Unlocking smart phone through handwaving biometrics L Yang, Y Guo, X Ding, J Han, Y Liu, C Wang, C Hu IEEE Transactions on Mobile Computing 14 (5), 1044-1055, 2014 | 80 | 2014 |
Randomizing RFID private authentication Q Yao, Y Qi, J Han, J Zhao, X Li, Y Liu 2009 IEEE International Conference on Pervasive Computing and Communications …, 2009 | 69 | 2009 |
ACTION: Breaking the privacy barrier for RFID systems L Lu, J Han, R Xiao, Y Liu IEEE INFOCOM 2009, 1953-1961, 2009 | 63 | 2009 |
Rumor riding: anonymizing unstructured peer-to-peer systems Y Liu, J Han, J Wang IEEE Transactions on Parallel and Distributed Systems 22 (3), 464-475, 2010 | 53 | 2010 |
Rumor riding: anonymizing unstructured peer-to-peer systems Y Liu, J Han, J Wang IEEE Transactions on Parallel and Distributed Systems 22 (3), 464-475, 2010 | 53 | 2010 |
Shelving interference and joint identification in large-scale RFID systems L Yang, Y Qi, J Han, C Wang, Y Liu IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013 | 45 | 2013 |
Shelving interference and joint identification in large-scale RFID systems L Yang, Y Qi, J Han, C Wang, Y Liu IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013 | 45 | 2013 |
Mutual anonymity for mobile p2p systems J Han, Y Liu IEEE Transactions on Parallel and Distributed Systems 19 (8), 1009-1019, 2008 | 40 | 2008 |
Human object estimation via backscattered radio frequency signal H Ding, J Han, AX Liu, J Zhao, P Yang, W Xi, Z Jiang 2015 IEEE conference on computer communications (INFOCOM), 1652-1660, 2015 | 37 | 2015 |
A mutual anonymous peer-to-peer protocol design J Han, Y Liu, L Xiao, R Xiao, LM Ni 19th IEEE International Parallel and Distributed Processing Symposium, 10 pp., 2005 | 36 | 2005 |
Revisting tag collision problem in RFID systems L Yang, J Han, Y Qi, C Wang, Y Liu, Y Cheng, X Zhong 2010 39th International Conference on Parallel Processing, 178-187, 2010 | 32 | 2010 |