Author of the publication

A Fractional Programming Method for Target Localization in Asynchronous Networks.

, , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AdaPID: An Adaptive PID Optimizer for Training Deep Neural Networks., , , and . ICASSP, page 3943-3947. IEEE, (2022)Decoupling the unfairness propagation chain in crowd sensing and learning systems for spatio-temporal urban monitoring., , and . BuildSys@SenSys, page 200-203. ACM, (2021)Phytochemistry and Bioactivities of Biflavonoids: a Review., , , , and . ICBBS, page 105-108. ACM, (2017)A Proactive Failure Tolerant Mechanism for SSDs Storage Systems based on Unsupervised Learning., , , , , , , and . IWQoS, page 1-10. IEEE, (2021)Capacity Optimization for Downlink Multiuser MISO UAV Mobile Communication., , , , and . GLOBECOM, page 1-6. IEEE, (2021)DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks., , , , , and . USENIX Security Symposium, page 1669-1686. USENIX Association, (2022)Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset., , , , , , , , and . USENIX Security Symposium, page 3935-3952. USENIX Association, (2021)Assessing Browser-level Defense against IDN-based Phishing., , , and . USENIX Security Symposium, page 3739-3756. USENIX Association, (2021)Double-Cross Attacks: Subverting Active Learning Systems., , and . USENIX Security Symposium, page 1593-1610. USENIX Association, (2021)Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers., , , and . USENIX Security Symposium, page 239-254. USENIX Association, (2014)