Author of the publication

A reputation system resilient against colluding and malicious adversaries in mobile participatory sensing applications.

, , , , , and . CCNC, page 829-834. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval., , , and . IACR Cryptology ePrint Archive, (2016)A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model., , , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 949-962 (2013)A Patient-centered Longitudinal Plan of Care: Vision Versus Reality., , , , , , and . AMIA, AMIA, (2013)Privacy-Preserving and Trustworthy Localization in an IoT Environment., and . CoRR, (2024)Secure and efficient decentralized machine learning through group-based model aggregation., , , , and . Clust. Comput., 27 (4): 3911-3925 (July 2024)Sustainable PV-powered FPGA-controlled high brightness LED illumination systems., , and . EDUCON, page 1-5. IEEE, (2012)Supplier Impersonation Fraud Detection in Business-To-Business Transaction Networks Using Self-Organizing Maps., , , and . COMPLEX NETWORKS (2), volume 882 of Studies in Computational Intelligence, page 599-610. Springer, (2019)Self-reported Verifiable Reputation with Rater Privacy., , , and . IFIPTM, volume 505 of IFIP Advances in Information and Communication Technology, page 180-195. Springer, (2017)Supplier Impersonation Fraud Detection using Bayesian Inference., , , and . BigComp, page 330-337. IEEE, (2020)A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case., , , , and . BigData Congress, page 25-30. IEEE Computer Society, (2013)