Zhibo Wang

Orcid: 0000-0002-5804-3279

Affiliations:
  • Zhejiang University, Hangzhou, China


According to our database1, Zhibo Wang authored at least 171 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
When Federated Learning Meets Knowledge Distillation.
IEEE Wirel. Commun., October, 2024

Practical and Robust Federated Learning With Highly Scalable Regression Training.
IEEE Trans. Neural Networks Learn. Syst., October, 2024

A Profit-Maximizing Data Marketplace with Differentially Private Federated Learning under Price Competition.
Proc. ACM Manag. Data, September, 2024

Double Polling-Based Tag Information Collection for Sensor-Augmented RFID Systems.
IEEE Trans. Mob. Comput., May, 2024

Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning.
IEEE/ACM Trans. Netw., April, 2024

Call White Black: Enhanced Image-Scaling Attack in Industrial Artificial Intelligence Systems.
IEEE Trans. Ind. Informatics, April, 2024

Computation Offloading in Multi-Cell Networks With Collaborative Edge-Cloud Computing: A Game Theoretic Approach.
IEEE Trans. Mob. Comput., March, 2024

Location Privacy-Aware Task Offloading in Mobile Edge Computing.
IEEE Trans. Mob. Comput., March, 2024

Label-Free Poisoning Attack Against Deep Unsupervised Domain Adaptation.
IEEE Trans. Dependable Secur. Comput., 2024

Task-Free Fairness-Aware Bias Mitigation for Black-Box Deployed Models.
IEEE Trans. Dependable Secur. Comput., 2024

PointNCBW: Towards Dataset Ownership Verification for Point Clouds via Negative Clean-label Backdoor Watermark.
CoRR, 2024

RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent.
CoRR, 2024

Textual Unlearning Gives a False Sense of Unlearning.
CoRR, 2024

Towards Real World Debiasing: A Fine-grained Analysis On Spurious Correlation.
CoRR, 2024

Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models.
CoRR, 2024

A Causal Explainable Guardrails for Large Language Models.
CoRR, 2024

SoK: Gradient Leakage in Federated Learning.
CoRR, 2024

FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition.
Proceedings of the 33rd USENIX Security Symposium, 2024

DAAP: Privacy-Preserving Model Accuracy Estimation on Unlabeled Datasets Through Distribution-Aware Adversarial Perturbation.
Proceedings of the 33rd USENIX Security Symposium, 2024

Towards Efficient Asynchronous Federated Learning in Heterogeneous Edge Environments.
Proceedings of the IEEE INFOCOM 2024, 2024

Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning.
Proceedings of the IEEE INFOCOM 2024, 2024

A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning.
IEEE Trans. Computers, July, 2023

Utility-Based Heterogeneous User Recruitment of Multitask in Mobile Crowdsensing.
IEEE Internet Things J., June, 2023

Temporal Correlation Enhanced Multiuser Detection for Uplink Grant-Free NOMA.
IEEE Trans. Mob. Comput., April, 2023

Towards a Robust Deep Neural Network Against Adversarial Texts: A Survey.
IEEE Trans. Knowl. Data Eng., March, 2023

Towards Privacy-Driven Truthful Incentives for Mobile Crowdsensing Under Untrusted Platform.
IEEE Trans. Mob. Comput., 2023

Poisoning-Assisted Property Inference Attack Against Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Class-Balanced Privacy Preserving Heterogeneous Model Aggregation.
IEEE Trans. Dependable Secur. Comput., 2023

VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023

Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems.
ACM Comput. Surv., 2023

Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning.
CoRR, 2023

SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution.
CoRR, 2023

A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives.
CoRR, 2023

CAPP-130: A Corpus of Chinese Application Privacy Policy Summarization and Interpretation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Locate and Verify: A Two-Stream Network for Improved Deepfake Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Cross-Modal and Multi-Attribute Face Recognition: A Benchmark.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Action Recognition with Multi-stream Motion Modeling and Mutual Information Maximization.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Towards Fairness-aware Adversarial Network Pruning.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Towards Transferable Targeted Adversarial Examples.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Privacy-preserving Adversarial Facial Features.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Towards Efficient Edge Learning for Large Models in Heterogeneous Resource-limited Environments.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023

2022
Temporal Correlation Enhanced Sparse Activity Detection in MIMO Enabled Grant-Free NOMA.
IEEE Trans. Veh. Technol., 2022

Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams.
IEEE/ACM Trans. Netw., 2022

Hear Sign Language: A Real-Time End-to-End Sign Language Recognition System.
IEEE Trans. Mob. Comput., 2022

Privacy-Preserving Streaming Truth Discovery in Crowdsourcing With Differential Privacy.
IEEE Trans. Mob. Comput., 2022

Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowdsensing Systems.
IEEE Trans. Mob. Comput., 2022

Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks.
IEEE Trans. Mob. Comput., 2022

OPAT: Optimized Allocation of Time-Dependent Tasks for Mobile Crowdsensing.
IEEE Trans. Ind. Informatics, 2022

DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Ind. Informatics, 2022

PrivStream: A privacy-preserving inference framework on IoT streaming data at the edge.
Inf. Fusion, 2022

Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training.
CoRR, 2022

A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses.
IEEE Commun. Surv. Tutorials, 2022

Privacy-preserving task allocation for edge computing-based mobile crowdsensing.
Comput. Electr. Eng., 2022

"Adversarial Examples" for Proof-of-Learning.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

An Efficient Two-Layer Task Offloading Scheme for MEC System with Multiple Services Providers.
Proceedings of the IEEE INFOCOM 2022, 2022

Towards Online Privacy-preserving Computation Offloading in Mobile Edge Computing.
Proceedings of the IEEE INFOCOM 2022, 2022

Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Trustworthy and Cost-Effective Cell Selection for Sparse Mobile Crowdsensing Systems.
IEEE Trans. Veh. Technol., 2021

Stealing Your Android Patterns via Acoustic Signals.
IEEE Trans. Mob. Comput., 2021

Towards Personalized Task-Oriented Worker Recruitment in Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2021

SocialRecruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment With Social Networks.
IEEE Trans. Mob. Comput., 2021

Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach.
IEEE Trans. Dependable Secur. Comput., 2021

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
IEEE Trans. Dependable Secur. Comput., 2021

Truth Discovery With Multi-Modal Data in Social Sensing.
IEEE Trans. Computers, 2021

Online policies for throughput maximization of backscatter assisted wireless powered communication via reinforcement learning approaches.
Pervasive Mob. Comput., 2021

Magic-hand: Turn a smartwatch into a mouse.
Pervasive Mob. Comput., 2021

Pain-FL: Personalized Privacy-Preserving Incentive for Federated Learning.
IEEE J. Sel. Areas Commun., 2021

Joint User Activity Identification and Channel Estimation for Grant-Free NOMA: A Spatial-Temporal Structure-Enhanced Approach.
IEEE Internet Things J., 2021

Fine-Grained and Context-Aware Behavioral Biometrics for Pattern Lock on Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

IEEE Access Special Section Editorial: Toward Smart Cities With IoT Based on Crowdsensing.
IEEE Access, 2021

AdaPDP: Adaptive Personalized Differential Privacy.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

A Truthful Procurement Auction for Incentivizing Heterogeneous Clients in Federated Learning.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Feature Importance-aware Transferable Adversarial Attacks.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

2020
Towards Demand-Driven Dynamic Incentive for Mobile Crowdsensing Systems.
IEEE Trans. Wirel. Commun., 2020

Cluster-Enabled Cooperative Scheduling Based on Reinforcement Learning for High-Mobility Vehicular Networks.
IEEE Trans. Veh. Technol., 2020

New Emoji Requests from Twitter Users: When, Where, Why, and What We Can Do About Them.
ACM Trans. Soc. Comput., 2020

SmartPI: Understanding Permission Implications of Android Apps from User Reviews.
IEEE Trans. Mob. Comput., 2020

Ranking Station Importance With Human Mobility Patterns Using Subway Network Datasets.
IEEE Trans. Intell. Transp. Syst., 2020

Analyzing User-Level Privacy Attack Against Federated Learning.
IEEE J. Sel. Areas Commun., 2020

Toward Efficient Compressed-Sensing-Based RFID Identification: A Sparsity-Controlled Approach.
IEEE Internet Things J., 2020

SCRA: Structured Compressive Random Access for Efficient Information Collection in IoT.
IEEE Internet Things J., 2020

Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions.
CoRR, 2020

Hybrid malware detection approach with feedback-directed machine learning.
Sci. China Inf. Sci., 2020

Towards fair and efficient task allocation in blockchain-based crowdsourcing.
CCF Trans. Netw., 2020

PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks.
Ad Hoc Networks, 2020

Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Towards compression-resistant privacy-preserving photo sharing on social networks.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

Towards Pattern-aware Privacy-preserving Real-time Data Collection.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Crowdsourced Binary-Choice Question Answering.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Dynamical Controller Placement Among SDN Space-Terrestrial Integrated Networks.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Attention-over-Attention Field-Aware Factorization Machine.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server.
IEEE Trans. Mob. Comput., 2019

Personalized Privacy-Preserving Task Allocation for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2019

An Energy Efficient Synchronization Protocol for Target Tracking in Wireless Sensor Array Networks.
Sensors, 2019

RMTS: A robust clock synchronization scheme for wireless sensor networks.
J. Netw. Comput. Appl., 2019

AirMouse: Turning a Pair of Glasses Into a Mouse in the Air.
IEEE Internet Things J., 2019

PRSS: A Prejudiced Random Sensing Strategy for Energy-Efficient Information Collection in the Internet of Things.
IEEE Internet Things J., 2019

Simultaneous Sensor Placement and Scheduling for Fusion-Based Detection in RF-Powered Sensor Networks.
IEEE Internet Things J., 2019

EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.
IEEE Internet Things J., 2019

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019

When Mobile Crowdsensing Meets Privacy.
IEEE Commun. Mag., 2019

Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing.
IEEE Commun. Mag., 2019

The World Wants Mangoes and Kangaroos: A Study of New Emoji Requests Based on Thirty Million Tweets.
Proceedings of the World Wide Web Conference, 2019

Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Towards Privacy-preserving Incentive for Mobile Crowdsensing Under An Untrusted Platform.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

PrivStream: Enabling Privacy-Preserving Inferences on IoT Data Stream at the Edge.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Unsupervised Fact-finding with Multi-modal Data in Social Sensing.
Proceedings of the 22th International Conference on Information Fusion, 2019

2018
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wirel. Commun. Mob. Comput., 2018

Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback.
IEEE Trans. Wirel. Commun., 2018

Approximate and Sublinear Spatial Queries for Large-Scale Vehicle Networks.
IEEE Trans. Veh. Technol., 2018

Charging While Moving: Deploying Wireless Chargers for Powering Wearable Devices.
IEEE Trans. Veh. Technol., 2018

MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems.
IEEE Trans. Veh. Technol., 2018

On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks.
IEEE Trans. Emerg. Top. Comput., 2018

Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2018

Narrowband Internet of Things Systems With Opportunistic D2D Communication.
IEEE Internet Things J., 2018

Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems.
IEEE Internet Things J., 2018

Heterogeneous incentive mechanism for time-sensitive and location-dependent crowdsensing networks with random arrivals.
Comput. Networks, 2018

Exploring Human Mobility Patterns in Urban Scenarios: A Trajectory Data Perspective.
IEEE Commun. Mag., 2018

A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks.
Comput. J., 2018

Be Stable and Fair: Robust Data Scheduling for Vehicular Networks.
IEEE Access, 2018

Sparsest Random Sampling for Cluster-Based Compressive Data Gathering in Wireless Sensor Networks.
IEEE Access, 2018

Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Pay On-Demand: Dynamic Incentive and Task Selection for Location-Dependent Mobile Crowdsensing Systems.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Dante: Enabling FOV-Aware Adaptive FEC Coding for 360-Degree Video Streaming.
Proceedings of the 2nd Asia-Pacific Workshop on Networking, 2018

2017
Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems.
IEEE Trans. Veh. Technol., 2017

Efficient 3-dimensional localization for RFID systems using jumping probe.
Pervasive Mob. Comput., 2017

Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags.
IEEE Internet Things J., 2017

Mitigating Link-flooding Attacks With Active Link Obfuscation.
CoRR, 2017

Achieving location error tolerant barrier coverage for wireless sensor networks.
Comput. Networks, 2017

Cost-effective barrier coverage formation in heterogeneous wireless sensor networks.
Ad Hoc Networks, 2017

Approximate Cardinality Estimation (ACE) in large-scale Internet of Things deployments.
Ad Hoc Networks, 2017

Exploiting social influence for context-aware event recommendation in event-based social networks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs.
IEEE Trans. Veh. Technol., 2016

A Traffic Adaptive Multi-Channel MAC Protocol with Dynamic Slot Allocation for WSNs.
IEEE Trans. Mob. Comput., 2016

SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2016

RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Outsourcing Large-Scale Systems of Linear Matrix Equations in Cloud Computing.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

2015
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks.
IEEE Trans. Mob. Comput., 2015

Securing DV-Hop localization against wormhole attacks in wireless sensor networks.
Pervasive Mob. Comput., 2015

End-to-end delay analysis for networked systems.
Frontiers Inf. Technol. Electron. Eng., 2015

pQueue-MAC: An Energy Efficient Hybrid MAC Protocol for Event-Driven Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Fault Tolerant Line-Based Barrier Coverage Formation in Mobile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Proceedings of the Computer Security - ESORICS 2015, 2015

Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets.
IEEE Trans. Parallel Distributed Syst., 2014

Achieving k-Barrier Coverage in Hybrid Directional Sensor Networks.
IEEE Trans. Mob. Comput., 2014

Applying biometrics to design three-factor remote user authentication scheme with key agreement.
Secur. Commun. Networks, 2014

Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Fault tolerant barrier coverage for wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Towards approximate spatial queries for large-scale vehicle networks.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

2013
HierTrack: an energy-efficient cluster-based target tracking system forwireless sensor networks.
J. Zhejiang Univ. Sci. C, 2013

A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

iQueue-MAC: A traffic adaptive duty-cycled MAC protocol with dynamic slot allocation.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Barrier Coverage in Hybrid Directional Sensor Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

2012
Queue-MAC: A queue-length aware hybrid CSMA/TDMA MAC protocol for providing dynamic adaptation to traffic and duty-cycle variation in wireless sensor networks.
Proceedings of the 9th IEEE International Workshop on Factory Communication Systems, 2012

A Novel Real-Time Traffic Information Collection System Based on Smartphone.
Proceedings of the Advances in Wireless Sensor Networks, 2012

2011
HierTrack: an energy efficient target tracking system for wireless sensor networks.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

Friendbook: privacy preserving friend matching based on shared interests.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

2010
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010

2008
Tracking and Predicting Moving Targets in Hierarchical Sensor Networks.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008


  Loading...