Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantifying Catastrophic Forgetting in Continual Federated Learning., , , , , , , and . ICASSP, page 1-5. IEEE, (2023)Learnings from Federated Learning in The Real World., , , , , and . ICASSP, page 8767-8771. IEEE, (2022)Training Mixed-Domain Translation Models via Federated Learning., , , , and . NAACL-HLT, page 2576-2586. Association for Computational Linguistics, (2022)Distributed Reputation System for Tracking Applications in Sensor Networks., , and . MobiQuitous, page 1-8. IEEE Computer Society, (2006)Robust Estimation and Detection in Ad Hoc and Sensor Networks., , and . MASS, page 236-245. IEEE Computer Society, (2006)Time synchronization attacks in sensor networks., , and . SASN, page 107-116. ACM, (2005)Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust., , , and . AINA Workshops (1), page 443-450. IEEE Computer Society, (2007)Security and Privacy Issues with Health Care Information Technology., , and . EMBC, page 5453-5458. IEEE, (2006)Testbed Implementation of a Secure Flooding Time Synchronization Protocol., , , and . WCNC, page 3157-3162. IEEE, (2008)Integrity checker for wireless sensor networks in health care applications., , and . PervasiveHealth, page 135-138. IEEE, (2008)