Author of the publication

Stealthy attacks with insider information: A game theoretic model with asymmetric feedback.

, , , , and . MILCOM, page 277-282. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications., , , , , , , and . IEEE Trans. Mob. Comput., 20 (10): 3066-3080 (2021)Online multi-resource allocation for deadline sensitive jobs with partial values in the cloud., and . INFOCOM, page 1-9. IEEE, (2016)Provably delay efficient data retrieving in storage clouds., , , , and . INFOCOM, page 585-593. IEEE, (2015)Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks., , , and . INFOCOM, page 136-144. IEEE, (2009)Enhancing LLM Safety via Constrained Direct Preference Optimization., , and . CoRR, (2024)Online Learning for Adaptive Probing and Scheduling in Dense WLANs., , and . INFOCOM, page 1-10. IEEE, (2023)Networked beamforming in dense mmWave WLANs., , , and . HotMobile, page 102-108. ACM, (2022)On the efficiency-vs-security tradeoff in the smart grid., , , and . CDC, page 1954-1959. IEEE, (2012)An Online Algorithm for Power-Proportional Data Centers with Switching Cost., , and . CDC, page 6025-6032. IEEE, (2018)Placement and Allocation of Virtual Network Functions: Multi-Dimensional Case., , and . IEEE Trans. Mob. Comput., 22 (7): 4195-4211 (July 2023)