Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense., , , , and . IEEE Trans. Mob. Comput., 14 (6): 1203-1217 (2015)Privacy-preserving energy theft detection in smart grids., , and . SECON, page 605-613. IEEE, (2012)Efficient Privacy-Preserving Large-Scale CP Tensor Decompositions., , and . GLOBECOM, page 1-6. IEEE, (2018)n-CD: A geometric approach to preserving location privacy in location-based services., , , and . INFOCOM, page 3012-3020. IEEE, (2013)Energy-Efficient Autonomic Offloading in Mobile Edge Computing., , , and . DASC/PiCom/DataCom/CyberSciTech, page 581-588. IEEE Computer Society, (2017)Energy-Source-Aware Cost Optimization for Green Cellular Networks with Strong Stability., , , , and . IEEE Trans. Emerg. Top. Comput., 4 (4): 541-555 (2016)Optimal Energy Cost for Strongly Stable Multi-hop Green Cellular Networks., , , , and . ICDCS, page 62-72. IEEE Computer Society, (2014)Efficient secure outsourcing of large-scale linear systems of equations., , , and . INFOCOM, page 1035-1043. IEEE, (2015)SecFact: Secure Large-scale QR and LU Factorizations., , , and . IEEE Trans. Big Data, 7 (4): 796-807 (2021)Efficient Secure Outsourcing of Large-scale Quadratic Programs., , , and . AsiaCCS, page 281-292. ACM, (2016)