default search action
Kun Zhao 0002
Person information
- affiliation: Xi'an Jiaotong University, School of Electronic and Information Engineering, Xi'an, China
Other persons with the same name
- Kun Zhao — disambiguation page
- Kun Zhao 0001 — University of Queensland, School of ITEE, Brisbane, Australia
- Kun Zhao 0003 — Suncorp Group, Brisbane, Australia (and 2 more)
- Kun Zhao 0004 — IBM Research Tokyo, Japan (and 1 more)
- Kun Zhao 0005 — Sony Research Center, Lund, Sweden (and 2 more)
- Kun Zhao 0006 — Xi'an Jiaotong University, School of Electrical Engineering, Xi'an, China (and 1 more)
- Kun Zhao 0007 — University of Pittsburgh, Department of Electrical and Computer Engineering, PA, USA (and 1 more)
- Kun Zhao 0008 — Nanjing University, School of Atmospheric Sciences, Key Laboratory of Mesoscale Severe Weather, Joint Center for Atmospheric Radar Research of CMA/NJU, Nanjing, China
- Kun Zhao 0009 — Foxconn Industrial Internet Company Ltd., Shenzhen, China
- Kun Zhao 0010 — East China Normal University, Engineering Center of SHMEC for Space Information and GNSS, Shanghai, China (and 1 more)
- Kun Zhao 0011 — China University of Petroleum, State Key Laboratory of Petroleum Resources and Prospecting, College of New Energy and Materials, Beijing, China
- Kun Zhao 0012 — Harbin Engineering University, College of Automation, Harbin, China
- Kun Zhao 0013 — Tulane University, Department of Mathematics, New Orleans, LA, USA
- Kun Zhao 0014 — Chinese Academy of Sciences, Institute of Automation, Brainnetome Center & National Laboratory of Pattern Recognition, Beijing, China (and 1 more)
- Kun Zhao 0015 — Beijing University of Posts and Telecommunications, School of Information and Communication Engineering, Beijing Key Laboratory of Network System Architecture and Convergence, Beijing, China
- Kun Zhao 0016 — China Aerodynamics Research and Development Centre, Key Laboratory of Aerodynamic Noise Control, Mianyang, China
- Kun Zhao 0017 — University of Melbourne, Melbourne School of Psychological Sciences, Melbourne, Australia
- Kun Zhao 0018 — School of Computer Science, Wuhan University, Wuhan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Ge Wang, Xiaofeng Shi, Haofan Cai, Chen Qian, Han Ding, Wei Xi, Kun Zhao, Jizhong Zhao, Jinsong Han:
A Generalized Method to Combat Multipaths for RFID Sensing. IEEE/ACM Trans. Netw. 31(1): 336-351 (2023) - 2022
- [j14]Wei Shi, Zuhao Chen, Kun Zhao, Wei Xi, Yuhang Qu, Hui He, Zhenge Guo, Zhe Ma, Xuhui Huang, Peng Wang, Bo Dong, Jizhong Zhao:
3D target location based on RFID polarization phase model. EURASIP J. Wirel. Commun. Netw. 2022(1): 17 (2022) - [j13]Zhiping Jiang, Tom H. Luan, Xincheng Ren, Dongtao Lv, Han Hao, Jing Wang, Kun Zhao, Wei Xi, Yueshen Xu, Rui Li:
Eliminating the Barriers: Demystifying Wi-Fi Baseband Design and Introducing the PicoScenes Wi-Fi Sensing Platform. IEEE Internet Things J. 9(6): 4476-4496 (2022) - [j12]Han Ding, Cui Zhao, Ge Wang, Kun Zhao, Wei Xi, Jizhong Zhao:
Utilizing Tag Interference for Refined Localization of Passive RFID. IEEE Internet Things J. 9(14): 12656-12672 (2022) - 2021
- [j11]Kun Zhao, Xiaoxian Yang, Wei Xi, Zhiping Jiang, Xiaohong Wang, Zhi Wang, Xinyuan Ji, Zhao Yang, Jizhong Zhao:
HCAR: Human continuous activity recognition using latent structure features. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j10]Zhi Wang, Yubing Li, Kun Zhao, Wei Shi, Liangliang Lin, Jizhong Zhao:
Worker Collaborative group estimation in spatial crowdsourcing. Neurocomputing 428: 385-391 (2021) - [j9]Wei Xi, Meichen Duan, Xiuxiu Bai, Kun Zhao, Lufeng Mo, Jizhong Zhao:
KEEP: Secure and Efficient Communication for Distributed IoT Devices. IEEE Internet Things J. 8(16): 12758-12770 (2021) - [j8]Kun Zhao, Wei Xi, Zhiping Jiang, Zhi Wang, Hui He, Tao Li, Xiaobin Zhang, Jizhong Zhao:
Indoor Geofencing Based on Sensorless Motion Sensing and Fingerprint Self-Updating. Mob. Networks Appl. 26(2): 851-869 (2021) - [j7]Zhiping Jiang, Chen Qian, Kun Zhao, Shuaiyu Chen, Rui Li, Xu Wang, Chen He, Junzhao Du:
VariSecure: Facial Appearance Variance based Secure Device Pairing. Mob. Networks Appl. 26(2): 870-883 (2021) - [c21]Liangliang Lin, Kun Zhao, Xiaoyu Ma, Wei Xi, Chen Yang, Hui He, Jizhong Zhao:
Human Motion Recognition Based on Wi-Fi Imaging. CollaborateCom (1) 2021: 608-627 - 2020
- [j6]Yubing Li, Kun Zhao, Fei Ren, Biao Wang, Jizhong Zhao:
Research on Super-Resolution Image Reconstruction Based on Low-Resolution Infrared Sensor. IEEE Access 8: 69186-69199 (2020) - [j5]Yubing Li, Kun Zhao, Meichen Duan, Wei Shi, Liangliang Lin, Xinyi Cao, Yang Liu, Jizhong Zhao:
Control Your Home With a Smartwatch. IEEE Access 8: 131601-131613 (2020) - [j4]Kun Zhao, Wei Xi, Zhi Wang, Jizhong Zhao, Ruimeng Wang, Zhiping Jiang:
SMSS: Secure Member Selection Strategy in Federated Learning. IEEE Intell. Syst. 35(4): 37-49 (2020) - [j3]Zhiping Jiang, Kun Zhao, Rui Li, Jizhong Zhao, Junzhao Du:
PHYAlert: identity spoofing attack detection and prevention for a wireless edge network. J. Cloud Comput. 9: 5 (2020) - [c20]Qigui Xu, Wei Xi, Lubing Han, Kun Zhao:
TAB: CSI Lossless Compression for MU-MIMO Network. CollaborateCom (1) 2020: 95-114 - [i3]Zhiping Jiang, Tom H. Luan, Han Hao, Jing Wang, Xincheng Ren, Kun Zhao, Wei Xi, Yueshen Xu, Rui Li:
Eliminating the Barriers: Demystify Wi-Fi Baseband Design And Introduce PicoScenes Wi-Fi Sensing Platform. CoRR abs/2010.10233 (2020)
2010 – 2019
- 2019
- [j2]Zhiping Jiang, Kun Zhao, Rui Li, Jizhong Zhao:
i-VALS: Visual Attention Localization for Mobile Service Computing. IEEE Access 7: 45166-45181 (2019) - [c19]Yang Zi, Wei Xi, Li Zhu, Fan Yu, Kun Zhao, Zhi Wang:
Wi-Fi Imaging Based Segmentation and Recognition of Continuous Activity. CollaborateCom 2019: 623-641 - [c18]Shiyuan Zhang, Wei Xi, Qigui Xu, Kun Zhao, Yuanhang Cai:
Accurate CSI Estimation to Eliminate Unnecessary Transmission for MU-MIMO Networks. EWSN 2019: 166-177 - 2018
- [c17]Zhiping Jiang, Rui Li, Kun Zhao, Shuaiyu Chen:
Secure Device Pairing via Facial Image Similarity. ICCCS (6) 2018: 13-25 - [c16]Zhao Yang, Wei Xi, Kun Zhao, Xiaohong Wang, Colin Allen, Jizhong Zhao:
Topic Model Based Management Frame Authentication Using CSI Information. ICCCS (6) 2018: 154-166 - 2017
- [c15]Kun Zhao, Wei Xi, Jinsong Han, Zhi Wang, Yaoxuan Yuan, Jizhong Zhao:
Efficient CSI Correction with CFO for Uplink MU-MIMO Networks. BigCom 2017: 256-264 - [c14]Han Ding, Chen Qian, Jinsong Han, Ge Wang, Wei Xi, Kun Zhao, Jizhong Zhao:
RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags. ICDCS 2017: 447-457 - [c13]Fei Wang, Wei Xi, Jinsong Han, Kun Zhao, Yuan Gao:
Security in Uplink MU-MIMO Networks: Poster Abstract. IoTDI 2017: 351-352 - [i2]Colin Allen, Hongliang Luo, Jaimie Murdock, Jianghuai Pu, Xiaohong Wang, Yanjie Zhai, Kun Zhao:
Topic Modeling the Hàn diăn Ancient Classics. CoRR abs/1702.00860 (2017) - 2016
- [c12]Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao:
Instant and Robust Authentication and Key Agreement among Mobile Devices. CCS 2016: 616-627 - [c11]Zhiping Jiang, Jinsong Han, Chen Qian, Wei Xi, Kun Zhao, Han Ding, Shaojie Tang, Jizhong Zhao, Panlong Yang:
VADS: Visual attention detection with a smartphone. INFOCOM 2016: 1-9 - [c10]Yuanhang Cai, Wei Xi, Kun Zhao, Jinsong Han, Jizhong Zhao:
Smart retransmission for CSI recovery in uplink multi-user MIMO networks. INFOCOM Workshops 2016: 1061-1062 - [c9]Yuanhang Cai, Wei Xi, Zhi Wang, Kun Zhao, Jinsong Han, Chen Qian, Han Ding, Jizhong Zhao:
CSI feedback reduction by checking its validity period: poster. MobiCom 2016: 469-470 - [c8]Kun Zhao, Wei Xi, Zhiping Jiang, Zhi Wang, Hongliang Luo, Jizhong Zhao, Xiaobin Zhang:
Leveraging Topic Model for CSI Based Human Activity Recognition. MSN 2016: 23-30 - 2015
- [c7]Kun Zhao, Chen Qian, Wei Xi, Jinsong Han, Xue Liu, Zhiping Jiang, Jizhong Zhao:
EMoD: Efficient Motion Detection of Device-Free Objects Using Passive RFID Tags. ICNP 2015: 291-301 - [c6]Hai-Jiang Xie, Li Lin, Zhiping Jiang, Wei Xi, Kun Zhao, Meiyong Ding, Jizhong Zhao:
Accelerating Crowdsourcing Based Indoor Localization Using CSI. ICPADS 2015: 274-281 - [c5]Wei Xi, Rong Ma, Yuanhang Cai, Kun Zhao:
Prevent CSI Spoofing in Uplink MU-MIMO Transmission. CSAR@SenSys 2015: 13-18 - [c4]Wei Xi, Dong Huang, Kun Zhao, Yubo Yan, Yuanhang Cai, Rong Ma, Deng Chen:
Device-free Human Activity Recognition using CSI. CSAR@SenSys 2015: 31-36 - 2014
- [b1]Jinsong Han, Wei Xi, Kun Zhao, Zhiping Jiang:
Device-Free Object Tracking Using Passive Tags. Springer Briefs in Electrical and Computer Engineering, Springer 2014, ISBN 978-3-319-12645-6, pp. 1-57 - [j1]Zhiping Jiang, Wei Xi, Xiangyang Li, Shaojie Tang, Jizhong Zhao, Jinsong Han, Kun Zhao, Zhi Wang, Bo Xiao:
Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation. J. Comput. Sci. Technol. 29(4): 589-604 (2014) - [c3]Deng Chen, Li Du, Zhiping Jiang, Wei Xi, Jinsong Han, Kun Zhao, Jizhong Zhao, Zhi Wang, Rui Li:
A fine-grained indoor localization using multidimensional Wi-Fi fingerprinting. ICPADS 2014: 494-501 - [c2]Wei Xi, Jizhong Zhao, Xiang-Yang Li, Kun Zhao, Shaojie Tang, Xue Liu, Zhiping Jiang:
Electronic frog eye: Counting crowd using WiFi. INFOCOM 2014: 361-369 - [c1]Wei Xi, Xiang-Yang Li, Chen Qian, Jinsong Han, Shaojie Tang, Jizhong Zhao, Kun Zhao:
KEEP: Fast secret key extraction protocol for D2D communication. IWQoS 2014: 350-359 - 2013
- [i1]Zhiping Jiang, Jizhong Zhao, Xiang-Yang Li, Wei Xi, Kun Zhao, Shaojie Tang, Jinsong Han:
Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-based Speed Estimation. CoRR abs/1307.6349 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint