Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scalable and Privacy-Aware IoT Service for Live Video Analytics., , , , , and . MMSys, page 38-49. ACM, (2017)Evolving Multilayer Neural Networks Using Permutation free Encoding Technique., and . IC-AI, page 32-38. CSREA Press, (2009)A Functional (Monadic) Second-Order Theory of Infinite Trees., and . CoRR, (2019)Securing Anonymous Communication Channels under the Selective DoS Attack., and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 362-370. Springer, (2013)Deep Learning with Game Theory Assisted Vertical Handover Optimization in a Heterogeneous Network., , , , , , and . Int. J. Artif. Intell. Tools, 32 (4): 2350012:1-2350012:33 (June 2023)Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice., , , and . IEEE Pervasive Comput., 17 (3): 35-46 (2018)Designing green IoT communication by adaptive spotted hyena tunicate swarm optimization-based cluster head selection.. Trans. Emerg. Telecommun. Technol., (2022)Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices., , and . Proc. Priv. Enhancing Technol., 2022 (2): 578-600 (2022)Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR., , and . CoRR, (2024)A proof theory of right-linear (omega-)grammars via cyclic proofs., and . CoRR, (2024)