Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Refining Self-Supervised Learning in Imaging: Beyond Linear Metric., , , and . ICIP, page 76-80. IEEE, (2022)On the Efficiency of Decentralized Search in Expert Networks., , , , , and . ICDCS, page 733-734. IEEE Computer Society, (2016)Decentralized search in expert networks: Generic models and performance bounds., , , , , and . ICNP, page 1-10. IEEE Computer Society, (2016)IPsec tunnels vs. identity-only obfuscation techniques for moving target networks., , , , , and . MILCOM, page 1-6. IEEE, (2012)Stochastic Process Models for Packet/Analytic-Based Network Simulations., , , and . PADS, page 72-79. IEEE Computer Society, (2008)Stealthy attacks with insider information: A game theoretic model with asymmetric feedback., , , , and . MILCOM, page 277-282. IEEE, (2016)Performance Bounds of Decentralized Search in Expert Networks for Query Answering., , , , , and . ACM Trans. Knowl. Discov. Data, 13 (2): 18:1-18:23 (2019)Query Answering Efficiency in Expert Networks Under Decentralized Search., , , , , and . CIKM, page 2119-2124. ACM, (2016)Stealthy attacks meets insider threats: A three-player game model., , , , and . MILCOM, page 25-30. IEEE, (2015)A signaling game model for moving target defense., , , , and . INFOCOM, page 1-9. IEEE, (2017)