Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scalable and Privacy-Aware IoT Service for Live Video Analytics., , , , , and . MMSys, page 38-49. ACM, (2017)Securing Anonymous Communication Channels under the Selective DoS Attack., and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 362-370. Springer, (2013)Evolving Multilayer Neural Networks Using Permutation free Encoding Technique., and . IC-AI, page 32-38. CSREA Press, (2009)A Functional (Monadic) Second-Order Theory of Infinite Trees., and . CoRR, (2019)Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices., , and . Proc. Priv. Enhancing Technol., 2022 (2): 578-600 (2022)Deep Learning with Game Theory Assisted Vertical Handover Optimization in a Heterogeneous Network., , , , , , and . Int. J. Artif. Intell. Tools, 32 (4): 2350012:1-2350012:33 (June 2023)Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice., , , and . IEEE Pervasive Comput., 17 (3): 35-46 (2018)Left-Handed Completeness for Kleene algebra, via Cyclic Proofs., , and . LPAR, volume 57 of EPiC Series in Computing, page 271-289. EasyChair, (2018)Designing green IoT communication by adaptive spotted hyena tunicate swarm optimization-based cluster head selection.. Trans. Emerg. Telecommun. Technol., (2022)Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR., , and . CoRR, (2024)