default search action
Joshua Juen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c7]Qian Cheng, Joshua Juen, Shashi Bellam, Deanna Close, Nicholas Fulara, Jonathan C. Silverstein, Bruce R. Schatz:
Classification Models for Pulmonary Function using Motion Analysis from Phone Sensors. AMIA 2016 - [c6]Qian Cheng, Jingbo Shang, Joshua Juen, Jiawei Han, Bruce R. Schatz:
Mining Discriminative Patterns to Predict Health Status for Cardiopulmonary Patients. BCB 2016: 41-49 - 2015
- [b1]Joshua Juen:
Maintaining privacy during continuous motion sensing. University of Illinois Urbana-Champaign, USA, 2015 - [j3]Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, Matthew Caesar:
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction. Proc. Priv. Enhancing Technol. 2015(2): 171-187 (2015) - [j2]Joshua Juen, Qian Cheng, Bruce R. Schatz:
A Natural Walking Monitor for Pulmonary Patients Using Mobile Phones. IEEE J. Biomed. Health Informatics 19(4): 1399-1405 (2015) - 2014
- [c5]Joshua Juen, Qian Cheng, Bruce R. Schatz:
Towards a natural walking monitor for pulmonary patients using simple smart phones. BCB 2014: 53-62 - [c4]Qian Cheng, Joshua Juen, Bruce R. Schatz:
Using mobile phones to simulate pulse oximeters: gait analysis predicts oxygen saturation. BCB 2014: 331-340 - [i2]Joshua Juen, Anupam Das, Aaron Johnson, Nikita Borisov, Matthew Caesar:
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction. CoRR abs/1410.1823 (2014) - 2013
- [c3]Qian Cheng, Joshua Juen, Yanen Li, Valentin Prieto-Centurion, Jerry A. Krishnan, Bruce R. Schatz:
GaitTrack: Health Monitoring of Body Motion from Spatio-Temporal Parameters of Simple Smart Phones. BCB 2013: 897 - 2011
- [j1]David C. Bergman, Dong (Kevin) Jin, Joshua Juen, Naoki Tanaka, Carl A. Gunter, Andrew K. Wright:
Nonintrusive Load-Shed Verification. IEEE Pervasive Comput. 10(1): 49-57 (2011) - [c2]Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov:
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. CCS 2011: 215-226 - [c1]Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong (Kevin) Jin, Carl A. Gunter:
Reconstructing Hash Reversal based Proof of Work Schemes. LEET 2011 - [i1]Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov:
Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting. CoRR abs/1109.0597 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint