Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Higher Order Support Vector Random Fields for Hyperspectral Image Classification., , , and . ISPRS Int. J. Geo Inf., 7 (1): 19 (2018)Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks., , , , , , , , , and 1 other author(s). CoRR, (2020)Joint Relay Selection and Resource Allocation for Delay-Sensitive Traffic in Multi-Hop Relay Networks., , , and . KSII Trans. Internet Inf. Syst., 16 (9): 3008-3028 (2022)Sliding Mode Control for a Surgical Teleoperation System via a Disturbance Observer., , and . IEEE Access, (2019)TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams., , , , , , , , , and 3 other author(s). SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-25. Springer, (2019)A Deep Neural Network Model of Particle Thermal Radiation in Packed Bed., and . AAAI, page 1029-1036. AAAI Press, (2020)Efficient and Density-Aware Routing for Wireless Sensor Networks., , , and . ICCCN, page 207-212. IEEE, (2006)TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis., , , , , , , , , and 3 other author(s). EuroS&P, page 560-575. IEEE, (2019)CDN Judo: Breaking the CDN DoS Protection with Itself., , , , , , , , and . NDSS, The Internet Society, (2020)Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks., , , , , , , , , and . CCS, page 1939-1952. ACM, (2020)