Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breakdown by Rumors: Vulnerability of D2D Communications from Online Social Networks., , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 496-508. Springer, (2017)Approximation Algorithms for Optimization Problems in Random Power-Law Graphs., , and . COCOA, volume 8881 of Lecture Notes in Computer Science, page 343-355. Springer, (2014)Localized Energy Efficient Detection and Tracking of Dynamic Phenomena., , and . GLOBECOM, page 1-5. IEEE, (2010)Leveraging Blockchain to Enhance Data Privacy in IoT-Based Applications., , and . CSoNet, volume 11280 of Lecture Notes in Computer Science, page 211-221. Springer, (2018)Profit maximization for multiple products in online social networks., , , and . INFOCOM, page 1-9. IEEE, (2016)Scalable bicriteria algorithms for the threshold activation problem in online social networks., , , and . INFOCOM, page 1-9. IEEE, (2017)A cutting-plane algorithm for solving a weighted influence interdiction problem., , and . Comput. Optim. Appl., 57 (1): 71-104 (2014)Optimization scheme for sensor coverage scheduling with bandwidth constraints., , , , and . Optim. Lett., 3 (1): 63-75 (2009)Preserving Privacy and Security in Federated Learning., and . IEEE/ACM Trans. Netw., 32 (1): 833-843 (February 2024)Guest Editorial Introduction to the Special Section on Reloading Feature-Rich Information Networks., , , , , and . IEEE Trans. Netw. Sci. Eng., 8 (2): 1256-1258 (2021)