Author of the publication

Security and Privacy in Device-to-Device (D2D) Communication: A Review.

, , , , , and . IEEE Commun. Surv. Tutorials, 19 (2): 1054-1079 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securebox: Toward Safer and Smarter IoT Networks., , , , and . CAN@CoNEXT, page 55-60. ACM, (2016)Enabling Seamless Device Association with DevLoc using Light Bulb Networks for Indoor IoT Environments., , and . CoRR, (2020)IOTURVA: Securing Device-to-Device (D2D) Communication in IoT Networks., , and . CHANTS@MOBICOM, page 1-6. ACM, (2017)Ethical Hacking for IoT Security: A First Look into Bug Bounty Programs and Responsible Disclosure., , and . CoRR, (2019)A Survey on Approximate Edge AI for Energy Efficient Autonomous Driving Services., , , , , and . CoRR, (2023)Design Guidelines for Inclusive Speaker Verification Evaluation Datasets., , and . CoRR, (2022)Transfer Learning-Based Outdoor Position Recovery with Telco Data., , , , , , and . CoRR, (2019)Tiny, Always-on, and Fragile: Bias Propagation through Design Choices in On-device Machine Learning Workflows., , , and . ACM Trans. Softw. Eng. Methodol., 32 (6): 155:1-155:37 (November 2023)Driving forces for Multi-Access Edge Computing (MEC) IoT integration in 5G., , , and . ICT Express, 7 (2): 127-137 (2021)Contact duration: Intricacies of human mobility., , , , and . Online Soc. Networks Media, (2022)