Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Robustness of Convolutional Networks Through Sleep-Like Replay., , , , , and . ICMLA, page 257-264. IEEE, (2023)PlumeWalk: Towards Threat Provenance Localization for IoT Networks., , , , and . COMSNETS, page 383-390. IEEE, (2019)SightsTeeple: Agreeing to Disagree with Functional Blockchain Consensus.. ICBC, page 1-9. IEEE, (2023)ProphetChain: Hostaging the Blockchain with Ransom Block Release.. COMSNETS, page 1-6. IEEE, (2022)A Quantum-Classical Scheme towards Quantum Functional Encryption.. CoRR, (2017)Myochain: A Blockchain Protocol for Delay Bounded Transaction Confirmation., , , and . COMSNETS, page 114-118. IEEE, (2023)How Should We Regulate Cryptocurrencies via Consensus?: A Strategic Framework for Optimal Legal Transaction Throughput., , and . Distributed Ledger Technol. Res. Pract., 2 (1): 4:1-4:20 (2023)TensorFIip: A Fast Fully-Decentralized Computational Lottery for Cryptocurrency Networks.. COMSNETS, page 246-253. IEEE, (2021)SpectraMap: Efficiently Constructing a Spatio-temporal RF Spectrum Occupancy Map., , , and . COMSNETS (Revised Selected Papers and Invited Papers), volume 10340 of Lecture Notes in Computer Science, page 53-71. Springer, (2017)How to Tell Deep Neural Networks What We Know., , , and . CoRR, (2021)