Author image not provided
 Y Thomas Hou

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article2.00
Citation Count12
Publication count6
Publication years2013-2017
Available for download1
Average downloads per article76.00
Downloads (cumulative)76
Downloads (12 Months)76
Downloads (6 Weeks)17
Arrow RightAuthor only

See all colleagues of this author


6 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 6 of 6
Sort by:

1 published by ACM
September 2017 ACM Transactions on Intelligent Systems and Technology (TIST) - Regular Papers and Special Issue: Data-driven Intelligence for Wireless Networking: Volume 9 Issue 1, October 2017
Publisher: ACM
Citation Count: 0
Downloads (6 Weeks): 17,   Downloads (12 Months): 76,   Downloads (Overall): 76

Full text available: PDFPDF
With the increasing popularity of augmented reality (AR) services, providing seamless human-computer interactions in the AR setting has received notable attention in the industry. Gesture control devices have recently emerged to be the next great gadgets for AR due to their unique ability to enable computer interaction with day-to-day gestures. ...
Keywords: EMG side-channel, augmented reality, keystroke detection, Information leakage, PIN sequence inference

January 2017 IEEE Transactions on Mobile Computing: Volume 16 Issue 1, January 2017
Publisher: IEEE Educational Activities Department
Citation Count: 0

Existing spectrum sharing paradigms have set clear boundaries between the primary and secondary networks. There is either no or very limited node-level cooperation between the primary and secondary networks. In this paper, we develop a new and bold spectrum-sharing paradigm beyond the state of the art for future wireless networks. ...

July 2016 IEEE Network: The Magazine of Global Internetworking: Volume 30 Issue 4, July 2016
Publisher: IEEE Press
Citation Count: 0

The rapid proliferation of personal wearable as well as embedded devices point to the emergence of networks of unprecedented size and complexity in the near future. Unfortunately, traditional network security solutions fall short of addressing the unique security requirements of the emerging environment given their general emphasis on administratively managed, ...

December 2013 IEEE Transactions on Information Forensics and Security: Volume 8 Issue 12, December 2013
Publisher: IEEE Press
Citation Count: 3

In this paper, we propose a privacy-preserving proximity-based security system for location-based services in wireless networks, without requiring any pre-shared secret, trusted authority, or public key infrastructure. In this system, the proximity-based authentication and session key establishment are implemented based on spatial temporal location tags. Incorporating the unique physical features ...

October 2013 MASS '13: Proceedings of the 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems
Publisher: IEEE Computer Society
Citation Count: 1

The dominant spectrum sharing paradigm of today is the interweave paradigm. This paper advocates a new and alternative paradigm called United network of Primary and Secondary networks (UPS). UPS allows a complete cooperation between primary and secondary networks at the node level to relay each other's traffic, in addition to ...
Keywords: Cognitive networking, Cross layer design and optimization, Cooperative and cognitive communication

July 2013 IEEE Transactions on Mobile Computing: Volume 12 Issue 7, July 2013
Publisher: IEEE Educational Activities Department
Citation Count: 6

This paper tries to reconcile the tension between the physical model and the protocol model that have been used to characterize interference relationship in a multihop wireless network. The physical model (a.k.a. signal-to-interference-and-noise ratio model) is widely considered as a reference model for physical layer behavior but its application in ...
Keywords: Interference modeling, protocol model, physical model, multihop wireless network, cross-layer optimization

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us