You can clone but you cannot hide: A survey of clone prevention and detection for RFID

K Bu, M Weng, Y Zheng, B **ao… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Radio-frequency identification (RFID) is one of the driving technologies for Internet of
Things. The architecture-succinctness and cost-effectiveness of RFID tags promise their …

Flexible and time-efficient tag scanning with handheld readers

X Liu, S Zhang, B **ao, K Bu - IEEE Transactions on Mobile …, 2015 - ieeexplore.ieee.org
Tag scanning is an important issue to dynamically manage tag IDs in radio frequency
identification (RFID) systems. Different from tag identification that collects IDs of all the tags …

STEP: A time-efficient tag searching protocol in large RFID systems

X Liu, B **ao, S Zhang, K Bu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The radio frequency identification (RFID) technology is greatly revolutionizing applications
such as warehouse management and inventory control in retail industry. In large RFID …

A novel tag searching protocol with time efficiency and searching accuracy in RFID systems

CG Liu, IH Liu, CD Lin, JS Li - Computer Networks, 2019 - Elsevier
Radio frequency identification technology is very popular in many aspects such as inventory
management in retail industry, object tracking and identification, etc. In practice, searching …

Toward a new PHY layer scheme for decoding tags collision signal in UHF RFID system

M Benbaghdad, B Fergani… - IEEE Communications …, 2016 - ieeexplore.ieee.org
Tag collision is one of the most significant limitations of the RFID systems. Current anti-
collision algorithms process the problem in medium access control layer as an estimation of …

Comb Decoding towards {Collision-Free}{WiFi}

S Zhao, Z Qu, Z Luo, Z Lu, Y Liu - 17th USENIX Symposium on …, 2020 - usenix.org
Packet collisions happen every day in WiFi networks. RTS/CTS is a widely-used approach to
reduce the cost of collisions of long data packets as well as combat the hidden terminal …

A cooperative Bayesian and lower bound estimation in dynamic framed slotted ALOHA algorithm for RFID systems

M Benssalah, M Djeddou, B Dahou… - International Journal …, 2018 - Wiley Online Library
A novel estimation scheme that combines Bayesian and lower bound estimating radio
frequency identification tag population size is proposed. The developed methodology is …

Who stole my cheese?: Verifying intactness of anonymous RFID systems

K Bu, J Bao, M Weng, J Liu, B **ao, X Liu, S Zhang - Ad Hoc Networks, 2016 - Elsevier
Abstract Radio-Frequency Identification (RFID) technology has fostered many object
monitoring applications. Along with this trend, a corresponding important problem is to verify …

Data-Oriented Approaches towards Mobile, Network and Secure Systems

S Zhao - 2021 - search.proquest.com
With the rapid evolvement of information science, data-oriented research has solicited a new
philosophy for the future mobile network and security design, since it can not only …

On Exploiting Concurrent Transmissions Through Discernible Interference Cancellation

J Yao, W Lou, L Wang, K Wu - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
This paper represents the design, feasibility evaluation, and performance validation of
ICMR, a novel cross layer protocol that can maximize concurrent transmissions and avoid …