Author of the publication

Spock: Exploiting Serverless Functions for SLO and Cost Aware Resource Procurement in Public Cloud.

, , , , , and . CLOUD, page 199-208. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ATM via satellite: A framework and implementation., , and . Wireless Networks, 4 (2): 141-153 (1998)Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning., , and . IEEE/ACM Trans. Netw., 21 (1): 28-40 (2013)Class-based stabilized virtual buffer-an AQM scheme with stability, fairness and QoS assurance, , , and . (2003)Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing., , and . CoRR, (2020)L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set., , and . CoRR, (2020)Improved Generative Semisupervised Learning Based on Finely Grained Component-Conditional Class Labeling., , , and . Neural Comput., 24 (7): 1926-1966 (2012)An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*., , , , and . MALWARE, page 61-67. IEEE, (2018)When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers., , and . CoRR, (2018)A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters., , , and . CoRR, (2018)Pheromone-aided robust multipath and multipriority routing in wireless MANETs., and . PE-WASUN, page 106-113. ACM, (2005)