Jinsong Han(韩劲松)
Jinsong Han(韩劲松)
Zhejiang University
Verified email at mail.xjtu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays
Y Liu, Y Zhao, L Chen, J Pei, J Han
IEEE Transactions on Parallel and Distributed Systems 23 (11), 2138-2149, 2011
2262011
Dynamic key-updating: Privacy-preserving authentication for RFID systems
L Lu, J Han, L Hu, Y Liu, LM Ni
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
1422007
Shelving interference and joint identification in large-scale RFID systems
L Yang, Y Qi, J Han, C Wang, Y Liu
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013
1242013
Shelving interference and joint identification in large-scale RFID systems
L Yang, Y Qi, J Han, C Wang, Y Liu
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013
1242013
Twins: Device-free object tracking using passive tags
J Han, C Qian, X Wang, D Ma, J Zhao, W Xi, Z Jiang, Z Wang
IEEE/ACM Transactions on Networking 24 (3), 1605-1617, 2015
1232015
Pseudo trust: Zero-knowledge authentication in anonymous P2Ps
L Lu, J Han, Y Liu, L Hu, JP Huai, L Ni, J Ma
IEEE Transactions on Parallel and Distributed Systems 19 (10), 1325-1337, 2008
892008
Cbid: A customer behavior identification system using passive tags
J Han, H Ding, C Qian, W Xi, Z Wang, Z Jiang, L Shangguan, J Zhao
IEEE/ACM Transactions on Networking 24 (5), 2885-2898, 2015
862015
Identification-free batch authentication for RFID tags
L Yang, J Han, Y Qi, Y Liu
The 18th IEEE International Conference on Network Protocols, 154-163, 2010
842010
Rejecting the attack: Source authentication for wi-fi management frames using csi information
Z Jiang, J Zhao, XY Li, J Han, W Xi
2013 Proceedings IEEE INFOCOM, 2544-2552, 2013
732013
GenePrint: Generic and accurate physical-layer identification for UHF RFID tags
J Han, C Qian, P Yang, D Ma, Z Jiang, W Xi, J Zhao
IEEE/ACM Transactions on Networking 24 (2), 846-858, 2015
652015
ACTION: Breaking the privacy barrier for RFID systems
L Lu, J Han, R Xiao, Y Liu
IEEE INFOCOM 2009, 1953-1961, 2009
582009
Randomizing RFID private authentication
Q Yao, Y Qi, J Han, J Zhao, X Li, Y Liu
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
582009
KEEP: Fast secret key extraction protocol for D2D communication
W Xi, XY Li, C Qian, J Han, S Tang, J Zhao, K Zhao
2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 350-359, 2014
562014
Unlocking smart phone through handwaving biometrics
L Yang, Y Guo, X Ding, J Han, Y Liu, C Wang, C Hu
IEEE Transactions on Mobile Computing 14 (5), 1044-1055, 2014
482014
Rumor riding: anonymizing unstructured peer-to-peer systems
Y Liu, J Han, J Wang
IEEE Transactions on Parallel and Distributed Systems 22 (3), 464-475, 2010
472010
Rumor riding: anonymizing unstructured peer-to-peer systems
Y Liu, J Han, J Wang
IEEE Transactions on Parallel and Distributed Systems 22 (3), 464-475, 2010
472010
Mutual anonymity for mobile p2p systems
J Han, Y Liu
IEEE Transactions on Parallel and Distributed Systems 19 (8), 1009-1019, 2008
342008
A mutual anonymous peer-to-peer protocol design
J Han, Y Liu, L Xiao, R Xiao, LM Ni
19th IEEE International Parallel and Distributed Processing Symposium, 10 pp., 2005
332005
Multiscale representations for fast pattern matching in stream time series
X Lian, L Chen, JX Yu, J Han, J Ma
IEEE transactions on knowledge and data engineering 21 (4), 568-581, 2008
322008
Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols
L Lu, J Han, L Hu, J Huai, Y Liu, LM Ni
2007 IEEE International Parallel and Distributed Processing Symposium, 1-10, 2007
282007
The system can't perform the operation now. Try again later.
Articles 1–20