Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perception-oriented generative adversarial network for retinal fundus image super-resolution., , , and . Comput. Biol. Medicine, (January 2024)Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling., , , and . DSN, page 411-423. IEEE, (2020)Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks., , , and . SP, page 285-302. IEEE, (2022)No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware., , , and . MobiSys, page 205-218. ACM, (2023)e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices., , , , and . CNS, page 1-9. IEEE, (2018)FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins., , , and . IEEE Trans. Vehicular Technology, 66 (11): 10461-10469 (2017)Privacy-preserving use of genomic data on mobile devices., , , and . ICCC, page 1-6. IEEE, (2015)PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems., , , and . CoRR, (2019)Two-party and multi-party private matching for proximity-based mobile social networks., , , , and . ICC, page 926-931. IEEE, (2014)Sample Efficient Offline-to-Online Reinforcement Learning., , , , , , and . IEEE Trans. Knowl. Data Eng., 36 (3): 1299-1310 (March 2024)