Author of the publication

Vulnerability aware graphs for RFID protocol security benchmarking.

, , , , and . J. Comput. Syst. Sci., 81 (6): 1027-1041 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical stochastic gradient identification for non-uniformly sampling Hammerstein systems with colored noise., , , , and . Comput. Syst. Sci. Eng., (2016)Molecular Simulation Studies on the Binding Selectivity of Type-I Inhibitors in the Complexes with ROS1 versus ALK., , , , , , , and . Journal of Chemical Information and Modeling, 57 (4): 977-987 (2017)Understanding Distributed Poisoning Attack in Federated Learning., , , , and . ICPADS, page 233-239. IEEE, (2019)Maximizing multicast lifetime in unreliable wireless ad hoc network., , , and . Wirel. Networks, 24 (4): 1175-1185 (2018)Sieve: Lightweight Robust Regression on Private Sensory Data., , , , and . WCNC, page 1-6. IEEE, (2019)Delay-Constrained Least-Energy-Consumption Multicast Routing Based on Heuristic Genetic Algorithm in Unreliable Wireless Networks., , and . GRMSE (2), volume 699 of Communications in Computer and Information Science, page 208-217. Springer, (2016)Revealing Privacy Vulnerabilities of Anonymous Trajectories., , , , and . IEEE Trans. Veh. Technol., 67 (12): 12061-12071 (2018)DePS: An improved deep learning model for de novo peptide sequencing., , , , , , , and . CoRR, (2022)SmartDog: Real-Time Detection of Smartphone Theft., , and . iThings/GreenCom/CPSCom/SmartData, page 223-228. IEEE, (2016)Wi-Tracker: Monitoring Breathing Airflow with Acoustic Signals., , , , and . WASA (1), volume 12937 of Lecture Notes in Computer Science, page 41-52. Springer, (2021)