Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

uStash: a Novel Mobile Content Delivery System for Improving User QoE in Public Transport., , , , and . CoRR, (2017)Supercharging Crowd Dynamics Estimation in Disasters via Spatio-Temporal Deep Neural Network., , , , , , and . DSAA, page 184-192. IEEE, (2017)Mobile social networking through friend-to-friend opportunistic content dissemination., , , and . MobiHoc, page 263-266. ACM, (2013)Efficient location management for hybrid wireless ATM networks: architecture and performance analysis., , and . WCNC, page 378-382. IEEE, (1999)A First Look into Privacy Leakage in 3D Mixed Reality Data., , and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 149-169. Springer, (2019)Blockchain and AI-based Solutions to Combat Coronavirus (COVID-19)-like Epidemics: A Survey., , , and . CoRR, (2021)The Use of Smart Contracts and Challenges., , , , , , and . CoRR, (2018)Network Traffic Classification Using WiFi Sensing., , and . MASCOTS (Revised Selected Papers), volume 12527 of Lecture Notes in Computer Science, page 48-61. Springer, (2020)CScrypt: A Compressive-Sensing-Based Encryption Engine for the Internet of Things: Demo Abstract., , , , and . SenSys, page 286-287. ACM, (2016)Utility Optimization for Blockchain Empowered Edge Computing with Deep Reinforcement Learning., , , , , and . ICC, page 1-6. IEEE, (2021)