Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilization and fairness in spectrum assignment for opportunistic spectrum access., , and . Mob. Networks Appl., 11 (4): 555-576 (2006)How Can IoT Services Pose New Security Threats In Operational Cellular Networks?, , , and . IEEE Trans. Mob. Comput., 20 (8): 2592-2606 (2021)Spatio-Temporal Analysis and Prediction of Cellular Traffic in Metropolis., , , , , , and . IEEE Trans. Mob. Comput., 18 (9): 2190-2202 (2019)Dependent Misconfigurations in 5G/4.5G Radio Resource Control., , , , , and . PACMNET, 1 (CoNEXT1): 2:1-2:20 (2023)MobileInsight: Analyzing Cellular Network Information on Smartphones., , , , , and . GetMobile Mob. Comput. Commun., 21 (1): 39-42 (2017)Uncovering insecure designs of cellular emergency services (911)., , , , , , , , , and 1 other author(s). MobiCom, page 703-715. ACM, (2022)iCellular: Device-Customized Cellular Network Access on Commodity Smartphones., , , , , , and . NSDI, page 643-656. USENIX Association, (2016)When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities., , , , , , , , , and 2 other author(s). CNS, page 1-9. IEEE, (2023)Breaking Geographic Routing Among Connected Vehicles., , and . DSN, page 42-54. IEEE, (2023)Power consumption analysis of video streaming in 4G LTE networks., , , , , , and . Wirel. Networks, 24 (8): 3083-3098 (2018)