Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid SDN Control in Mobile Ad Hoc Networks., , , , , and . SMARTCOMP, page 110-114. IEEE, (2019)Information Cascades in Feed-Based Networks of Users with Limited Attention., , , , and . IEEE Trans. Netw. Sci. Eng., 4 (2): 120-128 (2017)Co-evolution of two networks representing different social relations in NetSense., , , and . COMPLEX NETWORKS, volume 693 of Studies in Computational Intelligence, page 423-434. Springer, (2016)Harnessing the Power of Deception in Attack Graph-Based Security Games., , , , , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 147-167. Springer, (2020)Waypoint-based Topology Inference., , , and . ICC, page 1-6. IEEE, (2020)Optimal Resource Allocation for Crowdsourced Image Processing., , , , , and . SECON, page 1-9. IEEE, (2020)Efficient chaff-aided obfuscation in resource constrained environments., , , and . MILCOM, page 97-102. IEEE, (2017)Eluding ML-based Adblockers With Actionable Adversarial Examples., , , , , , , , , and 4 other author(s). ACSAC, page 541-553. ACM, (2021)Robust Coreset Construction for Distributed Machine Learning., , , , , and . GLOBECOM, page 1-6. IEEE, (2019)NATO Core Services profiling for Hybrid Tactical Networks - Results and Recommendations., , , , , and . ICMCIS, page 1-8. IEEE, (2021)