Author of the publication

Evaluating Network Boolean Tomography Under Byzantine Attacks.

, and . GLOBECOM, page 7574-7579. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dependency-Aware Computation Offloading in Mobile Edge Computing: A Reinforcement Learning Approach., , , and . IEEE Access, (2019)Detection of multipath routing with passive delay measurements: Hypothesis testing approaches., , , , and . Trans. Emerg. Telecommun. Technol., (2022)ABNN2: secure two-party arbitrary-bitwidth quantized neural network predictions., , , , , , and . DAC, page 361-366. ACM, (2022)Evaluating Network Boolean Tomography Under Byzantine Attacks., and . GLOBECOM, page 7574-7579. IEEE, (2023)An AI-Augmented Kalman Filter Approach to Monitoring Network Traffic Matrix., and . IEEE Trans. Netw. Sci. Eng., 11 (3): 2426-2437 (May 2024)Identify Congested Links Based on Enlarged State Space., , , , and . J. Comput. Sci. Technol., 31 (2): 350-358 (2016)Network Topology Tomography Under Multipath Routing., , , , and . IEEE Commun. Lett., 20 (3): 550-553 (2016)The Measurement Coverage for Boolean Tomography with Limited End Monitors.. iThings/GreenCom/CPSCom/SmartData, page 622-626. IEEE, (2018)Hole plastic scheme for geographic routing in wireless sensor networks., , and . ICC, page 6444-6449. IEEE, (2015)Software Defined Systems - Sensing, Communication and Computation, , , and . Springer Briefs in Computer Science Springer, (2020)