Author of the publication

Mechanism design games for thwarting malicious behavior in crowdsourcing applications.

, , , , , and . INFOCOM, page 1-9. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Macrocell Downlink Performance through Femtocell User Cooperation., , , and . WASA, volume 6843 of Lecture Notes in Computer Science, page 232-242. Springer, (2011)Topology Inference in Wireless Mesh Networks., , , and . WASA, volume 5682 of Lecture Notes in Computer Science, page 159-168. Springer, (2009)A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs., , , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 232-242. Springer, (2015)A Simple Implementation of the Stochastic Discrimination for Pattern Recognition., and . SSPR/SPR, volume 1876 of Lecture Notes in Computer Science, page 882-887. Springer, (2000)Low Price to Win: Interactive scheme in cooperative cognitive radio networks., , , and . ICC, page 7546-7551. IEEE, (2015)Sparsity and compressive sensing of sense-through-foliage radar signals., , , , and . ICC, page 6376-6380. IEEE, (2012)Fast Fault-Tolerant Sampling via Random Walk in Dynamic Networks., , , , , , and . ICDCS, page 536-544. IEEE, (2019)Differentially Private k-Anonymity: Achieving Query Privacy in Location-Based Services., , , , , and . IIKI, page 475-480. IEEE Computer Society, (2016)Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs., , , and . WASA, volume 6221 of Lecture Notes in Computer Science, page 36-46. Springer, (2010)Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments., , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 554-563. Springer, (2014)