Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction., , , and . Comput. Networks, (April 2023)RouteChain: Towards Blockchain-based secure and efficient BGP routing., , , , , and . Comput. Networks, (2022)Enriching Vulnerability Reports Through Automated and Augmented Description Summarization., and . CoRR, (2022)Editorial., and . EAI Endorsed Trans. Security Safety, 6 (22): e1 (2020)e-PoS: Making Proof-of-Stake Decentralized and Fair., , , , and . CoRR, (2021)Count-Less: A Counting Sketch for the Data Plane of High Speed Switches., , , , and . CoRR, (2021)Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications., , , and . CoRR, (2022)Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools., , , and . J. Netw. Comput. Appl., (2021)SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals., , and . WPES@CCS, page 209-221. ACM, (2021)Do Content Management Systems Impact the Security of Free Content Websites?, , , , , and . CSoNet, volume 13831 of Lecture Notes in Computer Science, page 141-154. Springer, (2022)