Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xian Pan
@article{DBLP:journals/cg/PanAJ19, author = {Xian Pan and Victor Arellano and Adri{\'{a}}n Jarabo}, title = {Transient instant radiosity for efficient time-resolved global illumination}, journal = {Comput. Graph.}, volume = {83}, pages = {107--113}, year = {2019}, url = {https://doi.org/10.1016/j.cag.2019.07.009}, doi = {10.1016/J.CAG.2019.07.009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cg/PanAJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PanLPY0RF16, author = {Xian Pan and Zhen Ling and Aniket Pingley and Wei Yu and Nan Zhang and Kui Ren and Xinwen Fu}, title = {Password Extraction via Reconstructed Wireless Mouse Trajectory}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {461--473}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2413410}, doi = {10.1109/TDSC.2015.2413410}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/PanLPY0RF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PanLPYR0F13, author = {Xian Pan and Zhen Ling and Aniket Pingley and Wei Yu and Kui Ren and Nan Zhang and Xinwen Fu}, title = {How Privacy Leaks From Bluetooth Mouse?}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/how-privacy-leaks-bluetooth-mouse}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PanLPYR0F13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PanLPYZF12, author = {Xian Pan and Zhen Ling and Aniket Pingley and Wei Yu and Nan Zhang and Xinwen Fu}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {How privacy leaks from bluetooth mouse?}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1013--1015}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382309}, doi = {10.1145/2382196.2382309}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PanLPYZF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HuangPFW11, author = {Junwei Huang and Xian Pan and Xinwen Fu and Jie Wang}, title = {Long {PN} code based {DSSS} watermarking}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {2426--2434}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5935064}, doi = {10.1109/INFCOM.2011.5935064}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HuangPFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.