Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is Non-Neutrality Profitable for the Stakeholders of the Internet Market?, , and . CoRR, (2016)Stable Nash equilibria of medium access games under symmetric, socially altruistic behavior, , , and . CoRR, (2010)A Stable Approach for Routing Queries in Unstructured P2P Networks., , and . IEEE/ACM Trans. Netw., 24 (5): 3136-3147 (2016)Average age of coupon type and related average age of information.. CoRR, (2018)Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks., , and . CoRR, (2019)Notes on Lipschitz Margin, Lipschitz Margin Training, and Lipschitz Margin p-Values for Deep Neural Network Classifiers., and . CoRR, (2019)Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra., and . Comput. Networks, 55 (10): 2361-2379 (2011)A Benchmark Study Of Backdoor Data Poisoning Defenses For Deep Neural Network Classifiers And A Novel Defense., , and . MLSP, page 1-6. IEEE, (2019)Spock: Exploiting Serverless Functions for SLO and Cost Aware Resource Procurement in Public Cloud., , , , , and . CLOUD, page 199-208. IEEE, (2019)PWC: A proactive worm containment solution for enterprise networks., , , , , and . SecureComm, page 433-442. IEEE, (2007)