Jinsong Han(韩劲松)
Jinsong Han(韩劲松)
Zhejiang University
Verified email at mail.xjtu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays
Y Liu, Y Zhao, L Chen, J Pei, J Han
IEEE Transactions on Parallel and Distributed Systems 23 (11), 2138-2149, 2011
2472011
Dynamic key-updating: Privacy-preserving authentication for RFID systems
L Lu, J Han, L Hu, LM Ni
International Journal of Distributed Sensor Networks 8 (5), 153912, 2012
1582012
Twins: Device-free object tracking using passive tags
J Han, C Qian, X Wang, D Ma, J Zhao, W Xi, Z Jiang, Z Wang
IEEE/ACM Transactions on Networking 24 (3), 1605-1617, 2015
1392015
Shelving interference and joint identification in large-scale RFID systems
L Yang, Y Qi, J Han, C Wang, Y Liu
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013
1322013
Shelving interference and joint identification in large-scale RFID systems
L Yang, Y Qi, J Han, C Wang, Y Liu
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013
1322013
Cbid: A customer behavior identification system using passive tags
J Han, H Ding, C Qian, W Xi, Z Wang, Z Jiang, L Shangguan, J Zhao
IEEE/ACM Transactions on Networking 24 (5), 2885-2898, 2015
1022015
Pseudo trust: Zero-knowledge authentication in anonymous P2Ps
L Lu, J Han, Y Liu, L Hu, JP Huai, L Ni, J Ma
IEEE Transactions on Parallel and Distributed Systems 19 (10), 1325-1337, 2008
972008
Identification-free batch authentication for RFID tags
L Yang, J Han, Y Qi, Y Liu
The 18th IEEE International Conference on Network Protocols, 154-163, 2010
932010
Rejecting the attack: Source authentication for wi-fi management frames using csi information
Z Jiang, J Zhao, XY Li, J Han, W Xi
2013 Proceedings IEEE INFOCOM, 2544-2552, 2013
792013
GenePrint: Generic and accurate physical-layer identification for UHF RFID tags
J Han, C Qian, P Yang, D Ma, Z Jiang, W Xi, J Zhao
IEEE/ACM Transactions on Networking 24 (2), 846-858, 2015
732015
KEEP: Fast secret key extraction protocol for D2D communication
W Xi, XY Li, C Qian, J Han, S Tang, J Zhao, K Zhao
2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 350-359, 2014
702014
Randomizing RFID private authentication
Q Yao, Y Qi, J Han, J Zhao, X Li, Y Liu
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
642009
Unlocking smart phone through handwaving biometrics
L Yang, Y Guo, X Ding, J Han, Y Liu, C Wang, C Hu
IEEE Transactions on Mobile Computing 14 (5), 1044-1055, 2014
632014
ACTION: Breaking the privacy barrier for RFID systems
L Lu, J Han, R Xiao, Y Liu
IEEE INFOCOM 2009, 1953-1961, 2009
602009
Rumor riding: anonymizing unstructured peer-to-peer systems
Y Liu, J Han, J Wang
IEEE Transactions on Parallel and Distributed Systems 22 (3), 464-475, 2010
502010
Rumor riding: anonymizing unstructured peer-to-peer systems
Y Liu, J Han, J Wang
IEEE Transactions on Parallel and Distributed Systems 22 (3), 464-475, 2010
502010
Mutual anonymity for mobile p2p systems
J Han, Y Liu
IEEE Transactions on Parallel and Distributed Systems 19 (8), 1009-1019, 2008
392008
A mutual anonymous peer-to-peer protocol design
J Han, Y Liu, L Xiao, R Xiao, LM Ni
19th IEEE International Parallel and Distributed Processing Symposium, 10 pp., 2005
342005
Multiscale representations for fast pattern matching in stream time series
X Lian, L Chen, JX Yu, J Han, J Ma
IEEE transactions on knowledge and data engineering 21 (4), 568-581, 2008
322008
Popularity adaptive search in hybrid P2P systems
X Shi, J Han, Y Liu, LM Ni
Journal of Parallel and Distributed Computing 69 (2), 125-134, 2009
292009
The system can't perform the operation now. Try again later.
Articles 1–20