Follow
Jinsong Han(韩劲松)
Jinsong Han(韩劲松)
Zhejiang University
Verified email at mail.xjtu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays
Y Liu, Y Zhao, L Chen, J Pei, J Han
IEEE Transactions on Parallel and Distributed Systems 23 (11), 2138-2149, 2011
2642011
Twins: Device-free object tracking using passive tags
J Han, C Qian, X Wang, D Ma, J Zhao, W Xi, Z Jiang, Z Wang
IEEE/ACM Transactions on Networking 24 (3), 1605-1617, 2015
1652015
Dynamic key-updating: Privacy-preserving authentication for RFID systems
L Lu, J Han, L Hu, LM Ni
International Journal of Distributed Sensor Networks 8 (5), 153912, 2012
1622012
Cbid: A customer behavior identification system using passive tags
J Han, H Ding, C Qian, W Xi, Z Wang, Z Jiang, L Shangguan, J Zhao
IEEE/ACM Transactions on Networking 24 (5), 2885-2898, 2015
1232015
Pseudo trust: Zero-knowledge authentication in anonymous P2Ps
L Lu, J Han, Y Liu, L Hu, JP Huai, L Ni, J Ma
IEEE Transactions on Parallel and Distributed Systems 19 (10), 1325-1337, 2008
1002008
GenePrint: Generic and accurate physical-layer identification for UHF RFID tags
J Han, C Qian, P Yang, D Ma, Z Jiang, W Xi, J Zhao
IEEE/ACM Transactions on Networking 24 (2), 846-858, 2015
992015
Identification-free batch authentication for RFID tags
L Yang, J Han, Y Qi, Y Liu
The 18th IEEE International Conference on Network Protocols, 154-163, 2010
992010
Rejecting the attack: Source authentication for wi-fi management frames using csi information
Z Jiang, J Zhao, XY Li, J Han, W Xi
2013 Proceedings IEEE INFOCOM, 2544-2552, 2013
912013
KEEP: Fast secret key extraction protocol for D2D communication
W Xi, XY Li, C Qian, J Han, S Tang, J Zhao, K Zhao
2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 350-359, 2014
902014
Unlocking smart phone through handwaving biometrics
L Yang, Y Guo, X Ding, J Han, Y Liu, C Wang, C Hu
IEEE Transactions on Mobile Computing 14 (5), 1044-1055, 2014
732014
Randomizing RFID private authentication
Q Yao, Y Qi, J Han, J Zhao, X Li, Y Liu
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
682009
ACTION: Breaking the privacy barrier for RFID systems
L Lu, J Han, R Xiao, Y Liu
IEEE INFOCOM 2009, 1953-1961, 2009
622009
Rumor riding: anonymizing unstructured peer-to-peer systems
Y Liu, J Han, J Wang
IEEE Transactions on Parallel and Distributed Systems 22 (3), 464-475, 2010
532010
Rumor riding: anonymizing unstructured peer-to-peer systems
Y Liu, J Han, J Wang
IEEE Transactions on Parallel and Distributed Systems 22 (3), 464-475, 2010
532010
Shelving interference and joint identification in large-scale RFID systems
L Yang, Y Qi, J Han, C Wang, Y Liu
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013
442013
Shelving interference and joint identification in large-scale RFID systems
L Yang, Y Qi, J Han, C Wang, Y Liu
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013
442013
Mutual anonymity for mobile p2p systems
J Han, Y Liu
IEEE Transactions on Parallel and Distributed Systems 19 (8), 1009-1019, 2008
412008
A mutual anonymous peer-to-peer protocol design
J Han, Y Liu, L Xiao, R Xiao, LM Ni
19th IEEE International Parallel and Distributed Processing Symposium, 10 pp., 2005
362005
Human object estimation via backscattered radio frequency signal
H Ding, J Han, AX Liu, J Zhao, P Yang, W Xi, Z Jiang
2015 IEEE conference on computer communications (INFOCOM), 1652-1660, 2015
352015
Revisting tag collision problem in RFID systems
L Yang, J Han, Y Qi, C Wang, Y Liu, Y Cheng, X Zhong
2010 39th International Conference on Parallel Processing, 178-187, 2010
322010
The system can't perform the operation now. Try again later.
Articles 1–20