Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nearest Neighbor Search with Strong Location Privacy., , and . Proc. VLDB Endow., 3 (1): 619-629 (2010)Modelling spatio-temporal ageing phenomena with deep Generative Adversarial Networks., , , and . Signal Process. Image Commun., (2021)Delegatable pseudorandom functions and applications., , , and . CCS, page 669-684. ACM, (2013)Routing policy verification for enhanced energy quality of service and security monitoring in IoT networks., , , , , and . PCI, page 43-48. ACM, (2019)Multi-objective Optimisation for Slice-aware Resource Orchestration in 5G Networks., , , and . ICIN, page 79-86. IEEE, (2020)IoT Network Attack Detection and Mitigation., , , , , , and . MECO, page 1-6. IEEE, (2020)Intrusion Detection System Based on Network Traffic Using Deep Neural Networks., , , , , , and . CAMAD, page 1-6. IEEE, (2019)User Profile-aware Daily Activity Prediction., , , , and . DSP, page 1-5. IEEE, (2023)A light-weighted ANN architecture for the classification of cyber-threats in modern communication networks., , , and . NOF, page 17-24. IEEE, (2019)AI-enabled Underground Water Pipe non -destructive Inspection., , , , , and . Multim. Tools Appl., 83 (6): 18309-18332 (February 2024)