Kun Zhao
Cited by
Cited by
Electronic frog eye: Counting crowd using WiFi
W Xi, J Zhao, XY Li, K Zhao, S Tang, X Liu, Z Jiang
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 361-369, 2014
Communicating is crowdsourcing: Wi-Fi indoor localization with CSI-based speed estimation
ZP Jiang, W Xi, X Li, S Tang, JZ Zhao, JS Han, K Zhao, Z Wang, B Xiao
Journal of Computer Science and Technology 29 (4), 589-604, 2014
KEEP: Fast secret key extraction protocol for D2D communication
W Xi, XY Li, C Qian, J Han, S Tang, J Zhao, K Zhao
2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 350-359, 2014
Instant and robust authentication and key agreement among mobile devices
W Xi, C Qian, J Han, K Zhao, S Zhong, XY Li, J Zhao
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Rfipad: Enabling cost-efficient and device-free in-air handwriting using passive tags
H Ding, C Qian, J Han, G Wang, W Xi, K Zhao, J Zhao
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
VADS: Visual attention detection with a smartphone
Z Jiang, J Han, C Qian, W Xi, K Zhao, H Ding, S Tang, J Zhao, P Yang
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
Device-free human activity recognition using CSI
W Xi, D Huang, K Zhao, Y Yan, Y Cai, R Ma, D Chen
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition …, 2015
A fine-grained indoor localization using multidimensional Wi-Fi fingerprinting
D Chen, L Du, Z Jiang, W Xi, J Han, K Zhao, J Zhao, Z Wang, R Li
2014 20th IEEE international conference on parallel and distributed systems …, 2014
Accelerating crowdsourcing based indoor localization using CSI
H Xie, L Lin, Z Jiang, W Xi, K Zhao, M Ding, J Zhao
2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015
EMoD: Efficient motion detection of device-free objects using passive RFID tags
K Zhao, C Qian, W Xi, J Han, X Liu, Z Jiang, J Zhao
2015 IEEE 23rd International Conference on Network Protocols (ICNP), 291-301, 2015
Device-free object tracking using passive tags
J Han, W Xi, K Zhao, Z Jiang
Springer, 2014
Identity-based remote data integrity checking of cloud storage from lattices
Z Liu, Y Liao, X Yang, Y He, K Zhao
2017 3rd International Conference on Big Data Computing and Communications …, 2017
Leveraging Topic Model for CSI Based Human Activity Recognition
K Zhao, W Xi, Z Jiang, Z Wang, H Luo, J Zhao, X Zhang
2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN …, 2016
Smart retransmission for CSI recovery in uplink multi-user MIMO networks
Y Cai, W Xi, K Zhao, J Han, J Zhao
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016
Wi-Fi Imaging Based Segmentation and Recognition of Continuous Activity
Y Zi, W Xi, L Zhu, F Yu, K Zhao, Z Wang
International Conference on Collaborative Computing: Networking …, 2019
Security in Uplink MU-MIMO Networks
F Wang, W Xi, J Han, K Zhao, Y Gao
2017 IEEE/ACM Second International Conference on Internet-of-Things Design …, 2017
CSI feedback reduction by checking its validity period: poster
Y Cai, W Xi, Z Wang, K Zhao, J Han, C Qian, H Ding, J Zhao
Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016
Prevent CSI Spoofing in Uplink MU-MIMO Transmission
W Xi, R Ma, Y Cai, K Zhao
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition …, 2015
PHYAlert: identity spoofing attack detection and prevention for a wireless edge network
Z Jiang, K Zhao, R Li, J Zhao, J Du
Journal of Cloud Computing 9 (1), 1-13, 2020
HCAR: Human continuous activity recognition using latent structure features
K Zhao, X Yang, W Xi, Z Jiang, X Wang, Z Wang, X Ji, Z Yang, J Zhao
Transactions on Emerging Telecommunications Technologies, e3807, 2019
The system can't perform the operation now. Try again later.
Articles 1–20