Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SyncAttack: Double-spending in Bitcoin Without Mining Power., , and . CCS, page 1668-1685. ACM, (2021)A Comprehensive Analysis of Healthcare Websites Usability Features, Testing Techniques and Issues., , , , and . IEEE Access, (2022)Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699., , , , , and . Comput. Networks, (2021)Exploring Partitioning Attacks on the Bitcoin Network., , , , and . IEEE/ACM Trans. Netw., 30 (1): 202-214 (2022)Tackling Imputation Across Time Series Models Using Deep Learning and Ensemble Learning., , , and . SMC, page 3084-3090. IEEE, (2020)Evaluation of Imputation Models Based on the Enhancement to Yield Forecasting., , , and . SMC, page 3416-3422. IEEE, (2021)Computing the Fourier Transformation over Temporal Data Streams (Invited Talk)., and . TIME, volume 147 of LIPIcs, page 1:1-1:4. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)Countering Selfish Mining in Blockchains., , , and . ICNC, page 360-364. IEEE, (2019)Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic., , , , and . ICDCS, page 1175-1187. IEEE, (2019)Output Regulation of n-Link Robotic Manipulator Using Feedback Linearizable Systems under the Approach of Cascade High Gain Observers., , and . ICCMA, page 16-20. ACM, (2018)