Author of the publication

Privacy Issues in Light of Reconnaissance Attacks with Incomplete Information.

, , , and . WI, page 311-318. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient spectral bound for link vulnerability assessment in large-scale networks., , and . MILCOM, page 1-6. IEEE, (2012)Transitivity Demolition and the Falls of Social Networks., , , , and . CoRR, (2017)Multiple Infection Sources Identification with Provable Guarantees., , , and . CIKM, page 1663-1672. ACM, (2016)A method to detect communities with stability in social networks., , , and . Soc. Netw. Anal. Min., 4 (1): 224 (2014)Optimal topology of gene-regulatory networks: role of the average shortest path., , , and . EAI Endorsed Trans. Self Adapt. Syst., 2 (7): e3 (2016)FastHare: Fast Hamiltonian Reduction for Large-scale Quantum Annealing., , , and . QCE, page 114-124. IEEE, (2022)OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding., , , and . ICDCS, page 525-535. IEEE, (2019)WAKE: a behind-the-ear wearable system for microsleep detection., , , , , , , , , and 1 other author(s). MobiSys, page 404-418. ACM, (2020)PhO2: Smartphone based Blood Oxygen Level Measurement Systems using Near-IR and RED Wave-guided Light., , , , , , , and . SenSys, page 26:1-26:14. ACM, (2017)Cost-aware Targeted Viral Marketing in billion-scale networks., , and . INFOCOM, page 1-9. IEEE, (2016)