Author of the publication

On extracting consistent graphs in wireless sensor networks.

, , , and . Int. J. Sens. Networks, 2 (3/4): 149-162 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of E-Scooters on Pedestrian Safety: A Field Study Using Pedestrian Crowd-Sensing., , , , and . PerCom Workshops, page 799-805. IEEE, (2022)A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables., , , , , and . CoRR, (2018)Keystroke inference using ambient light sensor on wrist-wearables: a feasibility study., , and . WearSys@MobiSys, page 21-26. ACM, (2018)A distortion-based metric for location privacy., , , and . WPES, page 21-30. ACM, (2009)On the scalable collection of metering data in smart grids through message concatenation., , and . SmartGridComm, page 318-323. IEEE, (2013)Towards a theory for securing time synchronization in wireless sensor networks., , , and . WISEC, page 201-212. ACM, (2009)Seer Grid: Privacy and Utility Implications of Two-Level Load Prediction in Smart Grids., , , , and . IEEE Trans. Parallel Distributed Syst., 28 (2): 546-557 (2017)(Smart)watch your taps: side-channel keystroke inference attacks using smartwatches., , , and . ISWC, page 27-30. ACM, (2015)On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains., , , , and . CoRR, (2020)BayBFed: Bayesian Backdoor Defense for Federated Learning., , , , and . SP, page 737-754. IEEE, (2023)