Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary Game of Knowledge Sharing in the Advanced Manufacturing Industry., , and . Int. J. Distributed Syst. Technol., 13 (4): 1-13 (2022)An efficient group key establishment in location-aided mobile ad hoc networks., and . PE-WASUN, page 57-64. ACM, (2005)A framework to mitigate airliner risk in air traffic management., and . CNS, page 324-332. IEEE, (2016)A solution based analysis of attack vectors on smart home systems., and . SSIC, page 1-6. IEEE, (2015)Towards Continual Learning Desiderata via HSIC-Bottleneck Orthogonalization and Equiangular Embedding., , , , , and . AAAI, page 13464-13473. AAAI Press, (2024)Poster: Toward a Theoretical Privacy Framework for Electronic Locks in Context of Home Security Monitoring System for Clouds of Things.. MobiHoc, page 393-394. ACM, (2015)Location Inference under Temporal Correlation., , , , and . ICCCN, page 1-10. IEEE, (2023)Improving Transferability of Adversarial Point Clouds with Model Commonalities., , , , and . CBS, page 176-183. IEEE, (2023)Short-Term and Long-Term Solutions for Secure Verification of Aircraft- Reported ADS-B Location in Air Traffic Networks., and . HICSS, page 1-8. ScholarSpace / AIS Electronic Library (AISeL), (2018)POSTER: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use., and . CCS, page 1647-1649. ACM, (2015)