Electronic frog eye: Counting crowd using WiFi W Xi, J Zhao, XY Li, K Zhao, S Tang, X Liu, Z Jiang IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 361-369, 2014 | 481 | 2014 |
Canopy closure estimates with greenorbs: Sustainable sensing in the forest L Mo, Y He, Y Liu, J Zhao, SJ Tang, XY Li, G Dai Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems …, 2009 | 449 | 2009 |
Femo: A platform for free-weight exercise monitoring with rfids H Ding, L Shangguan, Z Yang, J Han, Z Zhou, P Yang, W Xi, J Zhao Proceedings of the 13th ACM conference on embedded networked sensor systems …, 2015 | 197 | 2015 |
Reliable diversity-based spatial crowdsourcing by moving workers P Cheng, X Lian, Z Chen, R Fu, L Chen, J Han, J Zhao arXiv preprint arXiv:1412.0223, 2014 | 197 | 2014 |
Task assignment on multi-skill oriented spatial crowdsourcing P Cheng, X Lian, L Chen, J Han, J Zhao IEEE Transactions on Knowledge and Data Engineering 28 (8), 2201-2215, 2016 | 194 | 2016 |
Twins: Device-free object tracking using passive tags J Han, C Qian, X Wang, D Ma, J Zhao, W Xi, Z Jiang, Z Wang IEEE/ACM Transactions on Networking 24 (3), 1605-1617, 2015 | 190 | 2015 |
Footprint: detecting Sybil attacks in urban vehicular networks S Chang, Y Qi, H Zhu, J Zhao, X Shen IEEE Transactions on Parallel and Distributed Systems 23 (6), 1103-1114, 2011 | 168 | 2011 |
Localization of wireless sensor networks in the wild: Pursuit of ranging quality J Zhao, W Xi, Y He, Y Liu, XY Li, L Mo, Z Yang IEEE/ACM Transactions On Networking 21 (1), 311-323, 2012 | 146 | 2012 |
Cbid: A customer behavior identification system using passive tags J Han, H Ding, C Qian, W Xi, Z Wang, Z Jiang, L Shangguan, J Zhao IEEE/ACM Transactions on Networking 24 (5), 2885-2898, 2015 | 141 | 2015 |
GenePrint: Generic and accurate physical-layer identification for UHF RFID tags J Han, C Qian, P Yang, D Ma, Z Jiang, W Xi, J Zhao IEEE/ACM Transactions on Networking 24 (2), 846-858, 2015 | 123 | 2015 |
Instant and robust authentication and key agreement among mobile devices W Xi, C Qian, J Han, K Zhao, S Zhong, XY Li, J Zhao Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 106 | 2016 |
Rejecting the attack: Source authentication for wi-fi management frames using csi information Z Jiang, J Zhao, XY Li, J Han, W Xi 2013 Proceedings IEEE INFOCOM, 2544-2552, 2013 | 106 | 2013 |
Estimating crowd density in an RF-based dynamic environment Y Yuan, J Zhao, C Qiu, W Xi IEEE Sensors Journal 13 (10), 3837-3845, 2013 | 101 | 2013 |
KEEP: Fast secret key extraction protocol for D2D communication W Xi, XY Li, C Qian, J Han, S Tang, J Zhao, K Zhao 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 350-359, 2014 | 100 | 2014 |
Efficient data aggregation in multi-hop wireless sensor networks under physical interference model XY Li, XH Xu, SG Wang, SJ Tang, GJ Dai, JZ Zhao, Y Qi 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009 | 100 | 2009 |
Haze removal using the difference-structure-preservation prior L He, J Zhao, N Zheng, D Bi IEEE transactions on image processing 26 (3), 1063-1075, 2016 | 89 | 2016 |
RASPberry: A stable reader activation scheduling protocol in multi-reader RFID systems SJ Tang, J Yuan, XY Li, G Chen, Y Liu, JZ Zhao 2009 17th IEEE International Conference on Network Protocols, 304-313, 2009 | 83 | 2009 |
Communicating is crowdsourcing: Wi-Fi indoor localization with CSI-based speed estimation ZP Jiang, W Xi, X Li, S Tang, JZ Zhao, JS Han, K Zhao, Z Wang, B Xiao Journal of Computer Science and Technology 29 (4), 589-604, 2014 | 78 | 2014 |
Joint throughput optimization for wireless mesh networks XY Li, A Nusairat, Y Wu, Y Qi, JZ Zhao, X Chu, Y Liu IEEE transactions on mobile computing 8 (7), 895-909, 2008 | 77 | 2008 |
Crowd density estimation using wireless sensor networks Y Yuan, C Qiu, W Xi, J Zhao 2011 seventh international conference on mobile Ad-hoc and sensor networks …, 2011 | 72 | 2011 |