BibTeX records: Xian Pan

download as .bib file

@article{DBLP:journals/cg/PanAJ19,
  author       = {Xian Pan and
                  Victor Arellano and
                  Adri{\'{a}}n Jarabo},
  title        = {Transient instant radiosity for efficient time-resolved global illumination},
  journal      = {Comput. Graph.},
  volume       = {83},
  pages        = {107--113},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cag.2019.07.009},
  doi          = {10.1016/J.CAG.2019.07.009},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cg/PanAJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PanLPY0RF16,
  author       = {Xian Pan and
                  Zhen Ling and
                  Aniket Pingley and
                  Wei Yu and
                  Nan Zhang and
                  Kui Ren and
                  Xinwen Fu},
  title        = {Password Extraction via Reconstructed Wireless Mouse Trajectory},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {4},
  pages        = {461--473},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2413410},
  doi          = {10.1109/TDSC.2015.2413410},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/PanLPY0RF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PanLPYR0F13,
  author       = {Xian Pan and
                  Zhen Ling and
                  Aniket Pingley and
                  Wei Yu and
                  Kui Ren and
                  Nan Zhang and
                  Xinwen Fu},
  title        = {How Privacy Leaks From Bluetooth Mouse?},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/how-privacy-leaks-bluetooth-mouse},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PanLPYR0F13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PanLPYZF12,
  author       = {Xian Pan and
                  Zhen Ling and
                  Aniket Pingley and
                  Wei Yu and
                  Nan Zhang and
                  Xinwen Fu},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {How privacy leaks from bluetooth mouse?},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1013--1015},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382309},
  doi          = {10.1145/2382196.2382309},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PanLPYZF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HuangPFW11,
  author       = {Junwei Huang and
                  Xian Pan and
                  Xinwen Fu and
                  Jie Wang},
  title        = {Long {PN} code based {DSSS} watermarking},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {2426--2434},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5935064},
  doi          = {10.1109/INFCOM.2011.5935064},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HuangPFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics