Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic spectrum access: from cognitive radio to network radio., , , and . IEEE Wirel. Commun., 19 (1): 23-29 (2012)Enabling smartphone-based HD video chats by cooperative transmissions in CRNs., , , , , and . EURASIP J. Wirel. Commun. Netw., (2015)An Empirical Study of the Framework Impact on the Security of JavaScript Web Applications., , and . WWW (Companion Volume), page 753-758. ACM, (2018)Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments., , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 554-563. Springer, (2014)Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs., , , and . WASA, volume 6221 of Lecture Notes in Computer Science, page 36-46. Springer, (2010)zk-PCN: A Privacy-Preserving Payment Channel Network Using zk-SNARKs., , , , , and . IPCCC, page 57-64. IEEE, (2022)PPAR: A Privacy-Preserving Adaptive Ranking Algorithm for Multi-Armed-Bandit Crowdsourcing., , , , , and . IWQoS, page 1-10. IEEE, (2022)Proactive Deployment of Chain-based VNF Backup at the Edge using Online Bandit Learning., , , and . ICDCS, page 740-750. IEEE, (2021)Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel., , , , and . INFOCOM, page 1-10. IEEE, (2023)On Protecting the Data Privacy of Large Language Models (LLMs): A Survey., , , , , , and . CoRR, (2024)