450 results on '"Jiadi Yu"'
Search Results
2. Evolutionary game-based cooperative strategy for effective capacity of multiple-input-multiple-output communications
3. Guiding Graph Learning with Denoised Modality for Multi-modal Recommendation.
4. mmHand: 3D Hand Pose Estimation Leveraging mmWave Signals.
5. OpenAuth: Human Body-Based User Authentication Using mmWave Signals in Open-World Scenarios.
6. Graph Contrastive Learning for Truth Inference.
7. MuDiS: An Audio-independent, Wide-angle, and Leak-free Multi-directional Speaker.
8. MADM: A Model-agnostic Denoising Module for Graph-based Social Recommendation.
9. RFSpy: Eavesdropping on Online Conversations with Out-of-Vocabulary Words by Sensing Metal Coil Vibration of Headsets Leveraging RFID.
10. Distributed Spectrum Sharing in Cognitive Radio Networks: A Pricing-Based Decomposition Approach
11. Fusion of heterogeneous industrial wireless networks: A survey.
12. EMP: Exploiting Mobility Patterns for Collaborative Localization in Sparse Mobile Networks
13. Adaptive Network Management Service Based on Control Relation Graph for Software-Defined LEO Satellite Networks in 6G.
14. Graph Diffusion-Based Representation Learning for Sequential Recommendation.
15. An Imperceptible Eavesdropping Attack on WiFi Sensing Systems.
16. Secure and Controllable Secret Key Generation Through CSI Obfuscation Matrix Encapsulation.
17. Robust Mobile Two-Factor Authentication Leveraging Acoustic Fingerprinting.
18. AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
19. Practical Network Modeling Using Weak Supervision Signals for Human-Centric Networking in Metaverse.
20. Contrastive Multi-view Interest Learning for Cross-domain Sequential Recommendation.
21. Secure Mobile Two-Factor Authentication Leveraging Active Sound Sensing.
22. Robust Indoor Location Identification for Smartphones Using Echoes From Dominant Reflectors.
23. Sensing Human Gait for Environment-Independent User Authentication Using Commodity RFID Devices.
24. Time-Varying Resource Graph Based Processing on the Way for Space-Terrestrial Integrated Vehicle Networks.
25. DySched: Relieving Large-Scale Incast for Cloud-Native RDMA Applications.
26. Disentangled Contrastive Learning for Cross-Domain Recommendation.
27. AUDIOSENSE: Leveraging Current to Acoustic Channel to Detect Appliances at Single-Point.
28. Task-Difficulty-Aware Meta-Learning with Adaptive Update Strategies for User Cold-Start Recommendation.
29. Acoustic Sensing and Communication Using Metasurface.
30. Rating-Review Graph Contrastive Learning for Review-based Recommendation.
31. EAGLE: Heterogeneous GNN-based Network Performance Analysis.
32. Addressing Practical Challenges in Acoustic Sensing To Enable Fast Motion Tracking.
33. Effectively Learning Moiré QR Code Decryption from Simulated Data.
34. LigBee: Symbol-Level Cross-Technology Communication from LoRa to ZigBee.
35. mm3DFace: Nonintrusive 3D Facial Reconstruction Leveraging mmWave Signals.
36. Adaptive Graph Representation Learning for Next POI Recommendation.
37. WiFi signal-based user authentication
38. Learning Shared Representations for Recommendation with Dynamic Heterogeneous Graph Convolutional Networks.
39. Multifaceted Relation-aware Meta-learning with Dual Customization for User Cold-start Recommendation.
40. PV-TSC: Learning to Control Traffic Signals for Pedestrian and Vehicle Traffic in 6G Era.
41. A Survey on Cross-domain Recommendation: Taxonomies, Methods, and Future Directions.
42. Incorporating Heterogeneous User Behaviors and Social Influences for Predictive Analysis.
43. RF-Mic: Live Voice Eavesdropping via Capturing Subtle Facial Speech Dynamics Leveraging RFID.
44. VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
45. Toward Multi-User Authentication Using WiFi Signals.
46. ScreenID: Enhancing QRCode Security by Utilizing Screen Dimming Feature.
47. Delay-Optimal Cooperation Transmission in Remote Sensing Satellite Networks.
48. Optimized Controller Provisioning in Software-Defined LEO Satellite Networks.
49. MagneComm+: Near-Field Electromagnetic Induction Communication With Magnetometer.
50. Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.