Author of the publication

Seed-Based De-Anonymizability Quantification of Social Networks.

, , , , and . IEEE Trans. Inf. Forensics Secur., 11 (7): 1398-1411 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator., , , , , , , and . CoRR, (2018)Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid., , , and . IEEE Trans. Dependable Secur. Comput., 16 (6): 1026-1039 (2019)The case for collaborative distributed wireless intrusion detection systems., , and . GrC, page 782-787. IEEE, (2006)Application layer switching: a deployable technique for providing quality of service., , and . GLOBECOM, page 3694-3699. IEEE, (2003)PROVIZ: An integrated visualization and programming framework for WSNs., , and . LCN Workshops, page 146-149. IEEE Computer Society, (2013)SOTA: Secure Over-the-Air Programming of IoT Devices., , , and . MILCOM, page 1-8. IEEE, (2018)DEEP: A Deployable Energy Efficient 802.15.4 MAC Protocol for Sensor Networks., , and . ICC, page 1-6. IEEE, (2010)EDR2: A sink failure resilient approach for WSNs., , , , and . ICC, page 616-621. IEEE, (2012)CLIP: Content labeling in IPv6, a layer 3 protocol for information centric networking., , , and . ICC, page 3732-3737. IEEE, (2013)Covert DCF: A DCF-Based Covert Timing Channel in 802.11 Networks., and . MASS, page 570-579. IEEE Computer Society, (2011)