Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Review of Quick Simulation Methods for Queues., and . MASCOTS, page 17-21. The Society for Computer Simulation, (1993)Worst-case performance of a buffer with independent shaped arrival processes., and . IEEE Communications Letters, 4 (1): 26-28 (2000)Automated scheduling of deferrable PEV/PHEV load by power-profile unevenness., , and . SmartGridComm, page 235-240. IEEE, (2013)Admission control and routing in ATM networks using inferences from measured buffer occupancy., , , , and . IEEE Trans. Commun., 43 (2/3/4): 1778-1784 (1995)Revealing Perceptible Backdoors in DNNs, Without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic., , , and . MLSP, page 1-6. IEEE, (2020)Purposeful Mobility for Relaying and Surveillance in Mobile Ad Hoc Sensor Networks., and . IEEE Trans. Mob. Comput., 3 (3): 225-232 (2004)Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks., , , and . CoRR, (2021)Age of information distribution under dynamic service preemption., , and . CoRR, (2021)A Backdoor Attack against 3D Point Cloud Classifiers., , , , and . ICCV, page 7577-7587. IEEE, (2021)A graph partitioning game for distributed simulation of networks., , and . Cnet@ITC, page 9-16. ACM, (2011)