Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local tomography in fan-beam geometry using wavelets., , and . ICIP (2), page 709-712. (1996)Joint coding and embedding for collusion-resistant fingerprinting., , and . EUSIPCO, page 1-4. IEEE, (2002)Adaptive negative cycle detection in dynamic graphs., , and . ISCAS (5), page 163-166. IEEE, (2001)On Outage Probability for Stochastic Energy Harvesting Communications in Fading Channels., , , and . IEEE Signal Process. Lett., 22 (11): 1893-1897 (2015)Privacy or Utility in Data Collection? A Contract Theoretic Approach., , , , and . J. Sel. Topics Signal Processing, 9 (7): 1256-1269 (2015)Understanding Sequential User Behavior in Social Computing: To Answer or to Vote?, , and . IEEE Trans. Network Science and Engineering, 2 (3): 112-126 (2015)A time-efficient contributory key agreement scheme for secure group communications., , , and . ICC, page 1159-1163. IEEE, (2002)HADOF: defense against routing disruptions in mobile ad hoc networks., , and . INFOCOM, page 1252-1261. IEEE, (2005)Trust modeling and evaluation in ad hoc networks., , , and . GLOBECOM, page 6. IEEE, (2005)Securing dynamic group membership information over multicast: attacks and immunization., and . GLOBECOM, page 1466-1470. IEEE, (2003)