Long PN code based DSSS watermarking J Huang, X Pan, X Fu, J Wang 2011 Proceedings IEEE INFOCOM, 2426-2434, 2011 | 35 | 2011 |
How privacy leaks from bluetooth mouse? X Pan, Z Ling, A Pingley, W Yu, N Zhang, X Fu Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 21 | 2012 |
Password Extraction via Reconstructed Wireless Mouse Trajectory X Pan, Z Ling, A Pingley, W Yu, K Ren, N Zhang, X Fu IEEE Transactions on Dependable and Secure Computing (TDSC), 2015 | 13 | 2015 |
Hierarchical time-stamp protocol: Acquiring reliable time-stamp from local time stamping server X Pan, JL Zheng 2009 Second International Symposium on Electronic Commerce and Security 1 …, 2009 | 4 | 2009 |
Long PN code based traceback in wireless networks X Pan, J Huang, Z Ling, B Lu, X Fu International Journal of Performability Engineering 8 (2), 173, 2012 | 3 | 2012 |
Time to Correct Misunderstanding of Mouse X Pan, Z Ling, A Pingley, W Yu, K Ren, N Zhang, X Fu | | |