Author of the publication

Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.

, , , , , , , , and . Peer-to-Peer Computing, page 11-20. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Laplacian lines for real-time shape illustration., , , and . SI3D, page 129-136. ACM, (2009)Interactive optimization of near-isometric shape correspondence., , , , and . VRCAI, page 43-46. ACM, (2014)Robust Biometric Key Extraction Based on Iris Cryptosystem., , , and . ICB, volume 5558 of Lecture Notes in Computer Science, page 1060-1069. Springer, (2009)Non-separation method-based robust finite-time synchronization of uncertain fractional-order quaternion-valued neural networks., , , , and . Appl. Math. Comput., (2021)PoT quantization and rotational update mechanism for optimizing equalization in passive optical networks., , , , , , , , , and . J. Opt. Commun. Netw., 16 (3): 392-403 (March 2024)High-quality face image generation using particle swarm optimization-based generative adversarial networks., and . Future Gener. Comput. Syst., (2021)Optimal feature selection using distance-based discrete firefly algorithm with mutual information criterion., , and . Neural Comput. Appl., 28 (9): 2795-2808 (2017)An SAT-Based Method to Multithreaded Program Verification for Mobile Crowdsourcing Networks., , , , and . Wirel. Commun. Mob. Comput., (2018)Joint Time Delay and Angle Estimation Using the Matrix Pencil Method Based on Information Reconstruction Vector., , , and . KSII Trans. Internet Inf. Syst., 12 (12): 5860-5876 (2018)Stability and Hopf Bifurcation of a Stage-Structured Cannibalism Model with Two Delays., , , , , and . Int. J. Bifurc. Chaos, 31 (16): 2150242:1-2150242:22 (2021)