Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays Y Liu, Y Zhao, L Chen, J Pei, J Han IEEE Transactions on Parallel and Distributed Systems 23 (11), 2138-2149, 2011 | 286 | 2011 |
FEMO: A platform for free-weight exercise monitoring with RFIDs H Ding, L Shangguan, Z Yang, J Han, Z Zhou, P Yang, W Xi, J Zhao Proceedings of the 13th ACM conference on embedded networked sensor systems …, 2015 | 204 | 2015 |
Task assignment on multi-skill oriented spatial crowdsourcing P Cheng, X Lian, L Chen, J Han, J Zhao IEEE Transactions on Knowledge and Data Engineering 28 (8), 2201-2215, 2016 | 203 | 2016 |
Reliable diversity-based spatial crowdsourcing by moving workers P Cheng, X Lian, Z Chen, R Fu, L Chen, J Han, J Zhao arXiv preprint arXiv:1412.0223, 2014 | 199 | 2014 |
Twins: Device-free object tracking using passive tags J Han, C Qian, X Wang, D Ma, J Zhao, W Xi, Z Jiang, Z Wang IEEE/ACM Transactions on Networking 24 (3), 1605-1617, 2015 | 193 | 2015 |
Person-in-WiFi: Fine-grained person perception using WiFi F Wang, S Zhou, S Panev, J Han, D Huang Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019 | 182 | 2019 |
GRfid: A device-free RFID-based gesture recognition system Y Zou, J Xiao, J Han, K Wu, Y Li, LM Ni IEEE Transactions on Mobile Computing 16 (2), 381-393, 2016 | 177 | 2016 |
Joint activity recognition and indoor localization with WiFi fingerprints F Wang, J Feng, Y Zhao, X Zhang, S Zhang, J Han Ieee Access 7, 80058-80068, 2019 | 167 | 2019 |
Dynamic key-updating: Privacy-preserving authentication for RFID systems L Lu, J Han, L Hu, LM Ni International Journal of Distributed Sensor Networks 8 (5), 153912, 2012 | 163 | 2012 |
CBID: A customer behavior identification system using passive tags J Han, H Ding, C Qian, W Xi, Z Wang, Z Jiang, L Shangguan, J Zhao IEEE/ACM Transactions on Networking 24 (5), 2885-2898, 2015 | 143 | 2015 |
GenePrint: Generic and accurate physical-layer identification for UHF RFID tags J Han, C Qian, P Yang, D Ma, Z Jiang, W Xi, J Zhao IEEE/ACM Transactions on Networking 24 (2), 846-858, 2015 | 134 | 2015 |
Instant and robust authentication and key agreement among mobile devices W Xi, C Qian, J Han, K Zhao, S Zhong, XY Li, J Zhao Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 118 | 2016 |
Pseudo trust: Zero-knowledge authentication in anonymous P2Ps L Lu, J Han, Y Liu, L Hu, JP Huai, L Ni, J Ma IEEE Transactions on Parallel and Distributed Systems 19 (10), 1325-1337, 2008 | 116 | 2008 |
Season: Shelving interference and joint identification in large-scale RFID systems L Yang, J Han, Y Qi, C Wang, T Gu, Y Liu 2011 Proceedings IEEE INFOCOM, 3092-3100, 2011 | 113 | 2011 |
Rejecting the attack: Source authentication for wi-fi management frames using csi information Z Jiang, J Zhao, XY Li, J Han, W Xi 2013 Proceedings IEEE INFOCOM, 2544-2552, 2013 | 109 | 2013 |
ShopMiner: Mining customer shopping behavior in physical clothing stores with COTS RFID devices L Shangguan, Z Zhou, X Zheng, L Yang, Y Liu, J Han Proceedings of the 13th ACM conference on embedded networked sensor systems …, 2015 | 108 | 2015 |
KEEP: Fast secret key extraction protocol for D2D communication W Xi, XY Li, C Qian, J Han, S Tang, J Zhao, K Zhao 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 350-359, 2014 | 105 | 2014 |
Identification-free batch authentication for RFID tags L Yang, J Han, Y Qi, Y Liu The 18th IEEE International Conference on Network Protocols, 154-163, 2010 | 104 | 2010 |
Unlocking smart phone through handwaving biometrics L Yang, Y Guo, X Ding, J Han, Y Liu, C Wang, C Hu IEEE Transactions on Mobile Computing 14 (5), 1044-1055, 2014 | 87 | 2014 |
Communicating is crowdsourcing: Wi-Fi indoor localization with CSI-based speed estimation ZP Jiang, W Xi, X Li, S Tang, JZ Zhao, JS Han, K Zhao, Z Wang, B Xiao Journal of Computer Science and Technology 29 (4), 589-604, 2014 | 81 | 2014 |