Cited By
View all- Li SLi SLiu QSong YZhang CLu L(2024)Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via BackscatterIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.330560721:4(2434-2447)Online publication date: Jul-2024
- Na XGuo XYu ZZhang JHe YLiu YHui PAmiri Sani ANurmi PLiu Y(2023)Leggiero: Analog WiFi Backscatter with Payload TransparencyProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596835(436-449)Online publication date: 18-Jun-2023
- Li SMeng QBai YZhang CSong YLi SLu LCosta XHassanieh HAsadi ACox LPerino DWidmer JGiustiniano D(2023)Go Beyond RFID: Rethinking the Design of RFID Sensor Tags for Versatile ApplicationsProceedings of the 29th Annual International Conference on Mobile Computing and Networking10.1145/3570361.3613284(1-16)Online publication date: 2-Oct-2023
- Show More Cited By