Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehensive Analysis of Healthcare Websites Usability Features, Testing Techniques and Issues., , , , and . IEEE Access, (2022)Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699., , , , , and . Comput. Networks, (2021)Exploring Partitioning Attacks on the Bitcoin Network., , , , and . IEEE/ACM Trans. Netw., 30 (1): 202-214 (2022)BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails., , , , and . IEEE Syst. J., 16 (1): 1367-1378 (2022)SyncAttack: Double-spending in Bitcoin Without Mining Power., , and . CCS, page 1668-1685. ACM, (2021)Evaluation of Imputation Models Based on the Enhancement to Yield Forecasting., , , and . SMC, page 3416-3422. IEEE, (2021)Tackling Imputation Across Time Series Models Using Deep Learning and Ensemble Learning., , , and . SMC, page 3084-3090. IEEE, (2020)Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks., and . SP, page 111-125. IEEE, (2023)Action Knowledge Graph for Violence Detection Using Audiovisual Features., , , , , , and . ICCE, page 1-5. IEEE, (2024)Computing the Fourier Transformation over Temporal Data Streams (Invited Talk)., and . TIME, volume 147 of LIPIcs, page 1:1-1:4. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)