default search action
Shaxun Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j8]Shaxun Chen, Amit Pande, Kai Zeng, Prasant Mohapatra:
Live Video Forensics: Source Identification in Lossy Wireless Networks. IEEE Trans. Inf. Forensics Secur. 10(1): 28-39 (2015) - [c15]Ningning Cheng, Shaxun Chen, Parth H. Pathak, Prasant Mohapatra:
Long-Term Privacy Profiling through Smartphone Sensors. MASS 2015: 639-644 - 2014
- [j7]Amit Pande, Shaxun Chen, Prasant Mohapatra, Joseph Zambreno:
Hardware Architecture for Video Authentication Using Sensor Pattern Noise. IEEE Trans. Circuits Syst. Video Technol. 24(1): 157-167 (2014) - [j6]Shaxun Chen, Kai Zeng, Prasant Mohapatra:
Efficient Data Capturing for Network Forensics in Cognitive Radio Networks. IEEE/ACM Trans. Netw. 22(6): 1988-2000 (2014) - [c14]Shaxun Chen, Amit Pande, Prasant Mohapatra:
Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. MobiSys 2014: 109-122 - [c13]Amit Pande, Shaxun Chen, Prasant Mohapatra, Gaurav Pande:
Architecture for Blocking Detection in Wireless Video Source Authentication. VLSID 2014: 294-299 - 2013
- [j5]Shaxun Chen, Kai Zeng, Prasant Mohapatra:
Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space. IEEE Trans. Mob. Comput. 12(3): 401-411 (2013) - [c12]Shaxun Chen, Amit Pande, Kai Zeng, Prasant Mohapatra:
Video source identification in lossy wireless networks. INFOCOM 2013: 215-219 - 2012
- [c11]Shaxun Chen, Kai Zeng, Ningning Cheng, Prasant Mohapatra:
Transmit power estimation with a single monitor in multi-band networks. SECON 2012: 524-532 - 2011
- [c10]Shaxun Chen, Kai Zeng, Prasant Mohapatra:
Efficient data capturing for network forensics in cognitive radio networks. ICNP 2011: 176-185 - [c9]Shaxun Chen, Kai Zeng, Prasant Mohapatra:
Hearing is believing: Detecting mobile primary user emulation attack in white space. INFOCOM 2011: 36-40 - 2010
- [j4]Tao Gu, Shaxun Chen, XianPing Tao, Jian Lu:
An unsupervised approach to activity recognition and segmentation based on object-use fingerprints. Data Knowl. Eng. 69(6): 533-544 (2010) - [j3]Jun Li, Yingyi Bu, Shaxun Chen, XianPing Tao, Jian Lu:
Toward an agent-based pluggable infrastructure for context-awareness. Int. J. Pervasive Comput. Commun. 6(3): 286-310 (2010) - [j2]Paulito P. Palmes, Hung Keng Pung, Tao Gu, Wenwei Xue, Shaxun Chen:
Object relevance weight pattern mining for activity recognition and segmentation. Pervasive Mob. Comput. 6(1): 43-57 (2010) - [c8]Shaxun Chen, Kai Zeng, Prasant Mohapatra:
Jamming-Resistant Communication: Channel Surfing without Negotiation. ICC 2010: 1-6
2000 – 2009
- 2008
- [j1]Ningning Cheng, Shaxun Chen, XianPing Tao, Jian Lu, Guihai Chen:
A model for context-aware applications. Int. J. Pervasive Comput. Commun. 4(4): 428-439 (2008) - 2007
- [c7]Shaxun Chen, JiDong Ge, XianPing Tao, Jian Lu:
A Transaction Model for Context-Aware Applications. GPC 2007: 252-262 - [c6]Shaxun Chen, Tao Gu, XianPing Tao, Jian Lu:
Application Based Distance Measurement for Context Retrieval in Ubiquitous Computing. MobiQuitous 2007: 1-7 - 2006
- [c5]Jun Li, Yingyi Bu, Shaxun Chen, XianPing Tao, Jian Lu:
FollowMe: On Research of Pluggable Infrastructure for Context-Awareness. AINA (1) 2006: 199-204 - [c4]Yingyi Bu, Shaxun Chen, Jun Li, XianPing Tao, Jian Lu:
Context Consistency Management Using Ontology Based Model. EDBT Workshops 2006: 741-755 - [c3]Yingyi Bu, Tao Gu, XianPing Tao, Jun Li, Shaxun Chen, Jian Lu:
Managing Quality of Context in Pervasive Computing. QSIC 2006: 193-200 - [c2]Shaxun Chen, Yingyi Bu, Jun Li, XianPing Tao, Jian Lu:
Toward Context-Awareness: A Workflow Embedded Middleware. UIC 2006: 766-775 - 2005
- [c1]Yingyi Bu, Jun Li, Shaxun Chen, XianPing Tao, Jian Lu:
An Enhanced Ontology Based Context Model and Fusion Mechanism. EUC 2005: 920-929
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint