From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Inferring the QoE of HTTP video streaming from user-viewing activities., , , и . W-MUST@SIGCOMM, стр. 31-36. ACM, (2011)Cloak: A Ten-Fold Way for Reliable Covert Communications., , и . ESORICS, том 4734 из Lecture Notes in Computer Science, стр. 283-298. Springer, (2007)More Anonymity through Trust Degree in Trust-Based Onion Routing., , и . SecureComm, том 106 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 273-291. Springer, (2012)Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks., , и . NOMS, стр. 507-518. IEEE, (2006)Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing., , , , , , , , и . Secur. Commun. Networks, (2018)Dual-Anonymous Off-Line Electronic Cash for Mobile Payment., , , , , и . IEEE Trans. Mob. Comput., 22 (6): 3303-3317 (июня 2023)Beyond the virus: a first look at coronavirus-themed Android malware., , , , , , , , , и 1 other автор(ы). Empir. Softw. Eng., 26 (4): 82 (2021)CLUE: Towards Discovering Locked Cryptocurrencies in Ethereum., , , и . CoRR, (2020)Resisting DNN-Based Website Fingerprinting Attacks Enhanced by Adversarial Training., , , , , и . IEEE Trans. Inf. Forensics Secur., (2023)iBatch: Saving Ethereum Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations., , , , , и . CoRR, (2021)