Kun Zhao
Cited by
Cited by
Electronic frog eye: Counting crowd using WiFi
W Xi, J Zhao, XY Li, K Zhao, S Tang, X Liu, Z Jiang
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 361-369, 2014
Instant and robust authentication and key agreement among mobile devices
W Xi, C Qian, J Han, K Zhao, S Zhong, XY Li, J Zhao
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
KEEP: Fast secret key extraction protocol for D2D communication
W Xi, XY Li, C Qian, J Han, S Tang, J Zhao, K Zhao
2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 350-359, 2014
Communicating is crowdsourcing: Wi-Fi indoor localization with CSI-based speed estimation
ZP Jiang, W Xi, X Li, S Tang, JZ Zhao, JS Han, K Zhao, Z Wang, B Xiao
Journal of Computer Science and Technology 29 (4), 589-604, 2014
Rfipad: Enabling cost-efficient and device-free in-air handwriting using passive tags
H Ding, C Qian, J Han, G Wang, W Xi, K Zhao, J Zhao
2017 IEEE 37Th international conference on distributed computing systems …, 2017
Eliminating the barriers: Demystifying wi-fi baseband design and introducing the picoscenes wi-fi sensing platform
Z Jiang, TH Luan, X Ren, D Lv, H Hao, J Wang, K Zhao, W Xi, Y Xu, R Li
IEEE Internet of Things Journal 9 (6), 4476-4496, 2021
Device-free human activity recognition using CSI
W Xi, D Huang, K Zhao, Y Yan, Y Cai, R Ma, D Chen
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition …, 2015
VADS: Visual attention detection with a smartphone
Z Jiang, J Han, C Qian, W Xi, K Zhao, H Ding, S Tang, J Zhao, P Yang
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
PHYAlert: identity spoofing attack detection and prevention for a wireless edge network
Z Jiang, K Zhao, R Li, J Zhao, J Du
Journal of Cloud Computing 9, 1-13, 2020
Accelerating crowdsourcing based indoor localization using CSI
H Xie, L Lin, Z Jiang, W Xi, K Zhao, M Ding, J Zhao
2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015
Identity-based remote data integrity checking of cloud storage from lattices
Z Liu, Y Liao, X Yang, Y He, K Zhao
2017 3rd International Conference on Big Data Computing and Communications …, 2017
A fine-grained indoor localization using multidimensional Wi-Fi fingerprinting
D Chen, L Du, Z Jiang, W Xi, J Han, K Zhao, J Zhao, Z Wang, R Li
2014 20th IEEE international conference on parallel and distributed systems …, 2014
Worker collaborative group estimation in spatial crowdsourcing
Z Wang, Y Li, K Zhao, W Shi, L Lin, J Zhao
Neurocomputing 428, 385-391, 2021
SMSS: Secure member selection strategy in federated learning
K Zhao, W Xi, Z Wang, J Zhao, R Wang, Z Jiang
IEEE Intelligent Systems 35 (4), 37-49, 2020
Control your home with a smartwatch
Y Li, K Zhao, M Duan, W Shi, L Lin, X Cao, Y Liu, J Zhao
IEEE Access 8, 131601-131613, 2020
EMoD: Efficient motion detection of device-free objects using passive RFID tags
K Zhao, C Qian, W Xi, J Han, X Liu, Z Jiang, J Zhao
2015 IEEE 23rd International Conference on Network Protocols (ICNP), 291-301, 2015
Wi-Fi imaging based segmentation and recognition of continuous activity
Y Zi, W Xi, L Zhu, F Yu, K Zhao, Z Wang
Collaborative Computing: Networking, Applications and Worksharing: 15th EAI …, 2019
Device-free object tracking using passive tags
J Han, W Xi, K Zhao, Z Jiang
Springer, 2014
Keep: Secure and efficient communication for distributed iot devices
W Xi, M Duan, X Bai, K Zhao, L Mo, J Zhao
IEEE Internet of Things Journal 8 (16), 12758-12770, 2020
I-VALS: Visual attention localization for mobile service computing
Z Jiang, K Zhao, R Li, J Zhao
IEEE Access 7, 45166-45181, 2019
The system can't perform the operation now. Try again later.
Articles 1–20