Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes., , , , , , and . J. Syst. Archit., (2021)Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks., , , , , , and . NDSS, The Internet Society, (2023)LoRaDrone: Enabling Low-Power LoRa Data Transmission via a Mobile Approach., , , , , , and . MSN, page 239-246. IEEE, (2022)FreezePipe: An Efficient Dynamic Pipeline Parallel Approach Based on Freezing Mechanism for Distributed DNN Training., , , , , , , and . CSCWD, page 303-308. IEEE, (2023)A novel Website Fingerprinting attack against multi-tab browsing behavior., , and . CSCWD, page 234-239. IEEE, (2015)A Prediction-based Two-Stage Replica Replacement Algorithm., and . CSCWD, page 594-598. IEEE, (2007)QoS Deviation Distance Based Negotiation Algorithm in Grid Resource Advance Reservation., , , and . CSCWD, page 605-610. IEEE, (2007)Looking before Crossing: An Optimal Algorithm to Minimize UAV Energy by Speed Scheduling with a Practical Flight Energy Model., , , , and . INFOCOM, page 1758-1767. IEEE, (2020)Analysis of and defense against crowd-retweeting based spam in social networks., , , , , , and . World Wide Web, 22 (6): 2953-2975 (2019)Facilitating Application-Aware Bandwidth Allocation in the Cloud with One-Step-Ahead Traffic Information., , , , , and . IEEE Trans. Serv. Comput., 13 (2): 381-394 (2020)