Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Hop-Count-Based Source-to-Destination Distance Estimation in Wireless Sensor Networks With Applications in Localization., , and . IEEE Trans. Veh. Technol., 59 (6): 2998-3011 (2010)Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware., , , , and . IEEE Trans. Inf. Forensics Secur., 10 (11): 2270-2283 (2015)A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems., and . Secur. Commun. Networks, 7 (12): 2684-2695 (2014)Adverse Actions by a Certification Authority (CA) or Repository Manager in the Resource Public Key Infrastructure (RPKI)., and . RFC, (September 2017)A Typed Interrupt Calculus., and . FTRTFT, volume 2469 of Lecture Notes in Computer Science, page 291-310. Springer, (2002)A parameter selection strategy for particle swarm optimization based on particle positions., , , and . Expert Syst. Appl., 41 (7): 3576-3584 (2014)PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones., , , , , , and . IEEE Internet Things J., 1 (1): 33-45 (2014)Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks., , , , , and . IEEE Trans. Emerg. Top. Comput., 1 (2): 307-318 (2013)A CNN-transformer hybrid approach for an intrusion detection system in advanced metering infrastructure., , , , and . Multim. Tools Appl., 82 (13): 19463-19486 (May 2023)MFRNet: A New CNN Architecture for Post-Processing and In-loop Filtering., , and . IEEE J. Sel. Top. Signal Process., 15 (2): 378-387 (2021)