Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Assurance Integrity Techniques for Databases., , , and . BNCOD, volume 5071 of Lecture Notes in Computer Science, page 244-256. Springer, (2008)MELT: Mapreduce-based Efficient Large-scale Trajectory Anonymization., , and . SSDBM, page 35:1-35:6. ACM, (2017)Location Privacy Policy Management System., , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 427-434. Springer, (2012)Faster FAST: multicore acceleration of streaming financial data., , , , , , and . Comput. Sci. Res. Dev., 23 (3-4): 249-257 (2009)A Security Enhanced AODV Routing Protocol., , , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 298-307. Springer, (2005)Bigger Than We Thought: The Upbit Hack Gang., , and . MARBLE, page 178-185. Springer, (2023)Financial Crimes in Web3-Empowered Metaverse: Taxonomy, Countermeasures, and Opportunities., , , , , and . IEEE Open J. Comput. Soc., (2023)T-EDGE: Temporal WEighted MultiDiGraph Embedding for Ethereum Transaction Network Analysis., , , and . CoRR, (2019)Efficient parallel processing of high-dimensional spatial kNN queries., , , , and . Soft Comput., 26 (22): 12291-12316 (2022)Modeling and Understanding Ethereum Transaction Records via a Complex Network Approach., , , and . CoRR, (2020)