Author of the publication

ANTS: Pushing the rapid event notification in wireless sensor and actor networks.

, , , , and . iCAST/UMEDIA, page 753-758. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collective Memory for Detecting Nonconcurrent Clones: A Localized Approach for Global Topology and Identity Tracing in IoT Networks., , , , , , , , and . IEEE Internet Things J., 8 (7): 5762-5777 (2021)Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence., , , , , and . IEEE Internet Things J., 8 (8): 6757-6770 (2021)An efficient dynamic-identity based signature scheme for secure network coding., , , , and . Comput. Networks, 54 (1): 28-40 (2010)A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks., , , , and . IEEE Trans. Parallel Distributed Syst., 25 (1): 22-32 (2014)Security and privacy of collaborative spectrum sensing in cognitive radio networks., , , , and . IEEE Wirel. Commun., 19 (6): 106-112 (2012)Grus: Toward Unified-memory-efficient High-performance Graph Processing on GPU., , , , , and . ACM Trans. Archit. Code Optim., 18 (2): 22:1-22:25 (2021)Provably secure robust threshold partial blind signature., , and . Sci. China Ser. F Inf. Sci., 49 (5): 604-615 (2006)A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks., , , , and . Int. J. Secur. Networks, 3 (2): 122-132 (2008)Unleashing Cheapfakes through Trojan Plugins of Large Language Models., , , , , , , and . CoRR, (2023)A novel design for content delivery over software defined mobile social networks., , , and . IEEE Netw., 29 (4): 62-67 (2015)