Author of the publication

Agent-Based Routing for Wireless Sensor Network.

, , and . ICIC (1), volume 4681 of Lecture Notes in Computer Science, page 68-79. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards the Detection of Inconsistencies in Public Security Vulnerability Reports., , , , , and . USENIX Security Symposium, page 869-885. USENIX Association, (2019)FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data., , , , , and . NDSS, The Internet Society, (2021)Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation., , , , , , , , , and . IEEE Trans. Mob. Comput., 19 (12): 2946-2964 (2020)Agent-Based Routing for Wireless Sensor Network., , and . ICIC (1), volume 4681 of Lecture Notes in Computer Science, page 68-79. Springer, (2007)A highly scalable bandwidth estimation of commercial hotspot access points., , , and . INFOCOM, page 1143-1151. IEEE, (2011)Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems., , , and . Internet Measurement Conference, page 230-244. ACM, (2019)SafeVchat: A System for Obscene Content Detection in Online Video Chat Services., , , , , , , , and . ACM Trans. Internet Techn., 12 (4): 13:1-13:26 (2013)TrackMeOrNot: Enabling Flexible Control on Web Tracking., , , and . WWW, page 99-109. ACM, (2016)FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware., , , , and . CCS, page 2231-2244. ACM, (2017)RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections., , , , , , , and . CCS, page 3093-3107. ACM, (2023)