Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Centrality-based routing for Wireless Sensor Networks., , and . Wireless Days, page 1-5. IEEE, (2010)Skin Detection in Web Imagery: Comparison of Techniques and Proposal., , and . ICIP, page 3009-3012. IEEE, (2006)A reactive role assignment for data routing in event-based wireless sensor networks., , , , , and . Comput. Networks, 53 (12): 1980-1996 (2009)Speckle reduction with adaptive stack filters., , and . Pattern Recognit. Lett., (2014)GIN: Better going safe with personalized routes., , , and . ISCC, page 1-6. IEEE, (2020)Cloud-assisted Computing for Event-driven Mobile Services., , , , , and . Mob. Networks Appl., 19 (2): 161-170 (2014)Slicing who slices: Anonymization quality evaluation on deployment, privacy, and utility in mix-zones., , , , and . Comput. Networks, (November 2023)Statistical Properties of the Entropy from Ordinal Patterns., , , , , and . CoRR, (2022)Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities., , , , and . Comput. Secur., (2022)Proof-Carrying Sensing: Towards Real-World Authentication in Cyber-Physical Systems., , , , , and . SenSys, page 22:1-22:6. ACM, (2017)