Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud., , and . IEEE/ACM Trans. Netw., 23 (2): 603-615 (2015)H∞ model approximation for discrete-time Takagi-Sugeno fuzzy systems with Markovian jumping parameters., , , , , and . Neurocomputing, (2015)Nonparametric Inference for an Inverse-Probability-Weighted Estimator with Doubly Truncated Data.. Communications in Statistics - Simulation and Computation, 44 (2): 489-504 (2015)Spatial Intelligence for Regional Analysis., , , , and . IJAGR, 5 (2): 59-73 (2014)Two New Shrinking-Circle Methods for Source Localization Based on TDoA Measurements., , , and . Sensors, 18 (4): 1274 (2018)CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs., and . MobiHoc, page 9:1-9:10. ACM, (2017)Experience on Building an Architecture Level Adaptable System., and . CAiSE Workshops, volume 112 of Lecture Notes in Business Information Processing, page 171-179. Springer, (2012)FARSA: Fully Automated Roadway Safety Assessment., , , , , , , and . CoRR, (2019)Deep Transfer Network: Unsupervised Domain Adaptation., , , and . CoRR, (2015)Decision-making for in-network caching of Peer-to-Peer content chunks - An analytical modelling study., , , and . NOF, page 1-5. IEEE, (2014)