Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Automated Intelligence in 5G Systems., , , , , , , , and . ICCCN, page 1-9. IEEE, (2017)A Machine Learning Based Approach to Mobile Network Analysis., , , , , , and . ICCCN, page 1-9. IEEE, (2018)RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks., , , , , and . WCNC, page 2313-2318. IEEE, (2008)Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model., , , , and . CoRR, (2020)New Threats to SMS-Assisted Mobile Internet Services from 4G LTE Networks., , , , , , and . CoRR, (2015)Uninterruptible IMS: Maintaining Users Access During Faults in Virtualized IP Multimedia Subsystem., and . IEEE J. Sel. Areas Commun., 38 (7): 1464-1477 (2020)FESP: Fast and Energy Efficient Service Provisioning in 6LoWPAN., , , and . PIMRC, page 2575-2580. IEEE, (2010)Detecting Privacy Threats with Machine Learning: A Design Framework for Identifying Side-Channel Risks of Illegitimate User Profiling., , and . AMCIS, Association for Information Systems, (2023)An Architectural Framework for Web Portal in Ubiquitous Pervasive Environment., , , , , and . CNSR, page 102-109. IEEE Computer Society, (2009)ENUM Based Service Discovery Architecture for 6LoWPAN., , , and . WCNC, page 1-6. IEEE, (2010)