| Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays Y Liu, Y Zhao, L Chen, J Pei, J Han IEEE Transactions on Parallel and Distributed Systems 23 (11), 2138-2149, 2011 | 294 | 2011 |
| Person-in-WiFi: Fine-grained person perception using WiFi F Wang, S Zhou, S Panev, J Han, D Huang Proceedings of the IEEE/CVF international conference on computer vision …, 2019 | 260 | 2019 |
| Joint activity recognition and indoor localization with WiFi fingerprints F Wang, J Feng, Y Zhao, X Zhang, S Zhang, J Han Ieee Access 7, 80058-80068, 2019 | 245 | 2019 |
| Task assignment on multi-skill oriented spatial crowdsourcing P Cheng, X Lian, L Chen, J Han, J Zhao IEEE Transactions on Knowledge and Data Engineering 28 (8), 2201-2215, 2016 | 223 | 2016 |
| FEMO: A platform for free-weight exercise monitoring with RFIDs H Ding, L Shangguan, Z Yang, J Han, Z Zhou, P Yang, W Xi, J Zhao Proceedings of the 13th ACM conference on embedded networked sensor systems …, 2015 | 223 | 2015 |
| Twins: Device-free object tracking using passive tags J Han, C Qian, X Wang, D Ma, J Zhao, W Xi, Z Jiang, Z Wang IEEE/ACM Transactions on Networking 24 (3), 1605-1617, 2015 | 203 | 2015 |
| Reliable diversity-based spatial crowdsourcing by moving workers P Cheng, X Lian, Z Chen, R Fu, L Chen, J Han, J Zhao arXiv preprint arXiv:1412.0223, 2014 | 201 | 2014 |
| GRfid: A device-free RFID-based gesture recognition system Y Zou, J Xiao, J Han, K Wu, Y Li, LM Ni IEEE Transactions on Mobile Computing 16 (2), 381-393, 2016 | 199 | 2016 |
| Dynamic key-updating: Privacy-preserving authentication for RFID systems L Lu, J Han, L Hu, LM Ni International Journal of Distributed Sensor Networks 8 (5), 153912, 2012 | 163 | 2012 |
| CBID: A customer behavior identification system using passive tags J Han, H Ding, C Qian, W Xi, Z Wang, Z Jiang, L Shangguan, J Zhao IEEE/ACM Transactions on Networking 24 (5), 2885-2898, 2015 | 155 | 2015 |
| GenePrint: Generic and accurate physical-layer identification for UHF RFID tags J Han, C Qian, P Yang, D Ma, Z Jiang, W Xi, J Zhao IEEE/ACM Transactions on Networking 24 (2), 846-858, 2015 | 148 | 2015 |
| Instant and robust authentication and key agreement among mobile devices W Xi, C Qian, J Han, K Zhao, S Zhong, XY Li, J Zhao Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 133 | 2016 |
| Pseudo trust: Zero-knowledge authentication in anonymous P2Ps L Lu, J Han, Y Liu, L Hu, JP Huai, L Ni, J Ma IEEE Transactions on Parallel and Distributed Systems 19 (10), 1325-1337, 2008 | 127 | 2008 |
| Onefi: One-shot recognition for unseen gesture via cots wifi R Xiao, J Liu, J Han, K Ren Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems …, 2021 | 125 | 2021 |
| KEEP: Fast secret key extraction protocol for D2D communication W Xi, XY Li, C Qian, J Han, S Tang, J Zhao, K Zhao 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 350-359, 2014 | 122 | 2014 |
| ShopMiner: Mining customer shopping behavior in physical clothing stores with COTS RFID devices L Shangguan, Z Zhou, X Zheng, L Yang, Y Liu, J Han Proceedings of the 13th ACM conference on embedded networked sensor systems …, 2015 | 120 | 2015 |
| Season: Shelving interference and joint identification in large-scale RFID systems L Yang, J Han, Y Qi, C Wang, T Gu, Y Liu 2011 Proceedings IEEE INFOCOM, 3092-3100, 2011 | 119 | 2011 |
| Rejecting the attack: Source authentication for wi-fi management frames using csi information Z Jiang, J Zhao, XY Li, J Han, W Xi 2013 Proceedings IEEE INFOCOM, 2544-2552, 2013 | 112 | 2013 |
| Wavoice: A noise-resistant multi-modal speech recognition system fusing mmwave and audio signals T Liu, M Gao, F Lin, C Wang, Z Ba, J Han, W Xu, K Ren Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems …, 2021 | 107 | 2021 |
| Identification-free batch authentication for RFID tags L Yang, J Han, Y Qi, Y Liu The 18th IEEE International Conference on Network Protocols, 154-163, 2010 | 106 | 2010 |