Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GANDaLF: GAN for Data-Limited Fingerprinting., , , , and . Proc. Priv. Enhancing Technol., 2021 (2): 305-322 (2021)Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks., , , , and . Proc. Priv. Enhancing Technol., 2020 (3): 5-24 (2020)Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks., , , , and . CoRR, (2019)Blockchain-Enabled SLA Compliance for Crowdsourced Edge-Based Network Function Virtualization., , and . IEEE Netw., 35 (5): 58-65 (2021)A Novel Privacy Preserving Search Technique for Stego Data in Untrusted Cloud., , , and . HICSS, page 1-10. ScholarSpace, (2019)A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems., , , , and . IEEE Trans. Ind. Informatics, 18 (7): 5007-5017 (2022)Channel Transition Invariant Fast Broadcasting Scheme., and . CoRR, (2017)Reversible Biosignal Steganography Approach for Authenticating Biosignals Using Extended Binary Golay Code., , and . IEEE J. Biomed. Health Informatics, 25 (1): 35-46 (2021)A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living., , , , and . ACM Trans. Internet Techn., 22 (3): 57:1-57:25 (2022)Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things., , , , , and . CoRR, (2023)