Author of the publication

Investigating Trojan Attacks on Pre-trained Language Model-powered Database Middleware.

, , and . KDD, page 437-447. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance of distributed algorithms for maximizing multicast lifetime in mobile ad hoc networks., and . PE-WASUN, page 152-159. ACM, (2005)A software defined wireless sensor network., , , , , , and . ICNC, page 847-852. IEEE, (2014)Energy Management of Data Centers Powered by Fuel Cells and Heterogeneous Energy Storage., , , , , and . ICC, page 1-6. IEEE, (2018)Analytical Performance Evaluation of Distributed Multicast Algorithms for Directional Communications in WANETs., , and . Networking, volume 4479 of Lecture Notes in Computer Science, page 1153-1156. Springer, (2007)Trajectory and Data Planning for Mobile Relay to Enable Efficient Internet Access after Disasters., , , and . GLOBECOM, page 1-6. IEEE, (2015)Dynamic segmented network coding for reliable data dissemination in delay tolerant networks., , , and . ICC, page 63-67. IEEE, (2012)Deactivation-controlled epidemic routing in disruption tolerant networks with multiple sinks., , , and . GLOBECOM, page 4604-4609. IEEE, (2014)Service provisioning update scheme for mobile application users in a cloudlet network., and . ICC, page 1-6. IEEE, (2017)Software Defined Systems - Sensing, Communication and Computation, , , and . Springer Briefs in Computer Science Springer, (2020)Crowdsourcing on mobile cloud: Cost minimization of joint data acquisition and processing., , and . INFOCOM Workshops, page 358-362. IEEE, (2014)