Author of the publication

A Privacy Preserving Smart Metering System Supporting Multiple Time Granularities.

, , and . SERE (Companion), page 119-126. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliable Repair Mechanisms with Low Connection Cost for Code Based Distributed Storage Systems., , and . SERE, page 235-244. IEEE, (2014)An Empirical Study on Data Retrievability in Decentralized Erasure Code Based Distributed Storage Systems., , and . SERE, page 30-39. IEEE, (2013)Is Artificial Intelligence/Machine Learning the Anticipated Silver Bullet?, and . Computer, 53 (12): 18-19 (2020)Adversarial Machine Learning: Attacks From Laboratories to the Real World., and . Computer, 54 (5): 56-60 (2021)A Secure Decentralized Erasure Code for Distributed Networked Storage., and . IEEE Trans. Parallel Distributed Syst., 21 (11): 1586-1594 (2010)Keyed Non-parametric Hypothesis Tests., , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 632-645. Springer, (2019)Towards Demystifying Adversarial Robustness of Binarized Neural Networks., , and . ACNS Workshops, volume 12809 of Lecture Notes in Computer Science, page 439-462. Springer, (2021)AnchorCAN: Anchor-Based Secure CAN Communications System., , , , , and . DSC, page 1-7. IEEE, (2018)SWOON: A Testbed for Secure Wireless Overlay Networks., , , , , , , , , and 6 other author(s). CSET, USENIX Association, (2008)Keyed Non-Parametric Hypothesis Tests., , , , and . CoRR, (2020)