Year |
Citation |
Score |
2022 |
Zhang Y, Guo C, Deng M, Li S, Chen Y, Gu X, Tang G, Lin Y, Wang Y, He W, Li M, Zhang Y, Luo Y, Wang X, Chen Q, et al. Genome-Wide Analysis of the ERF Family and Identification of Potential Genes Involved in Fruit Ripening in Octoploid Strawberry. International Journal of Molecular Sciences. 23. PMID 36142464 DOI: 10.3390/ijms231810550 |
0.326 |
|
2020 |
Liu J, Liu H, Chen Y, Wang Y, Wang C. Wireless Sensing for Human Activity: A Survey Ieee Communications Surveys and Tutorials. 22: 1629-1645. DOI: 10.1109/Comst.2019.2934489 |
0.454 |
|
2020 |
Wang C, Wang Y, Chen Y, Liu H, Liu J. User authentication on mobile devices: Approaches, threats and trends Computer Networks. 170: 107118. DOI: 10.1016/J.Comnet.2020.107118 |
0.449 |
|
2019 |
Wang Y, Chen Y, Ye F, Liu H, Yang J. Implications of smartphone user privacy leakage from the advertiser's perspective Pervasive and Mobile Computing. 53: 13-32. DOI: 10.1016/J.Pmcj.2018.12.006 |
0.428 |
|
2018 |
Wang Y, Li H, Zang S, Li F, Chen Y, Zhang X, Song Z, Peng Q, Gu F. Photoreceptor Cell-Derived CAPN5 Regulates Retinal Pigment Epithelium Cell Proliferation Through Direct Regulation of SLIT2 Cleavage. Investigative Ophthalmology & Visual Science. 59: 1810-1821. PMID 29610848 DOI: 10.1167/iovs.17-22689 |
0.305 |
|
2018 |
Wang C, Guo X, Chen Y, Wang Y, Liu B. Personal PIN Leakage from Wearable Devices Ieee Transactions On Mobile Computing. 17: 646-660. DOI: 10.1109/Tmc.2017.2737533 |
0.456 |
|
2018 |
Liu H, Wang Y, Liu J, Yang J, Chen Y, Poor HV. Authenticating Users Through Fine-Grained Channel Information Ieee Transactions On Mobile Computing. 17: 251-264. DOI: 10.1109/Tmc.2017.2718540 |
0.435 |
|
2018 |
Liu J, Chen Y, Wang Y, Chen X, Cheng J, Yang J. Monitoring Vital Signs and Postures During Sleep Using WiFi Signals Ieee Internet of Things Journal. 5: 2071-2084. DOI: 10.1109/Jiot.2018.2822818 |
0.421 |
|
2016 |
Wang Y, Chen YJ, Yang J, Gruteser M, Martin RP, Liu H, Liu L, Karatas C. Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors Ieee Transactions On Mobile Computing. 15: 1965-1981. DOI: 10.1109/Tmc.2015.2483501 |
0.418 |
|
2014 |
Wang Y, Chuah M, Chen Y. Incentive Based Data Sharing in Delay Tolerant Mobile Networks Ieee Transactions On Wireless Communications. 13: 370-381. DOI: 10.1109/Twc.2013.120413.130670 |
0.436 |
|
2014 |
Liu H, Yang J, Wang Y, Chen Y, Koksal CE. Group secret key generation via received signal strength: Protocols, achievable rates, and implementation Ieee Transactions On Mobile Computing. 13: 2820-2835. DOI: 10.1109/Tmc.2014.2310747 |
0.447 |
|
2014 |
Liu H, Yang J, Sidhom S, Wang Y, Chen Y, Ye F. Accurate WiFi Based Localization for Smartphones Using Peer Assistance Ieee Transactions On Mobile Computing. 13: 2199-2214. DOI: 10.1109/Tmc.2013.140 |
0.423 |
|
2014 |
Wang Y, Chen Y, Martin RP. Leveraging wi-fi signals to monitor human queues Ieee Pervasive Computing. 13: 14-17. DOI: 10.1109/Mprv.2014.28 |
0.417 |
|
Show low-probability matches. |