Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are you contributing trustworthy data?: the case for a reputation system in participatory sensing., , and . MSWiM, page 14-22. ACM, (2010)How mobility patterns drive disease spread: A case study using public transit passenger card travel data., , , , and . CoRR, (2020)Energy Efficient Legitimate Wireless Surveillance of UAV Communications., , , , and . IEEE Trans. Vehicular Technology, 68 (3): 2283-2293 (2019)Contextual Bandit Learning for Activity-Aware Things-of-Interest Recommendation in an Assisted Living Environment., , , , and . ADC, volume 12610 of Lecture Notes in Computer Science, page 37-49. Springer, (2021)Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions., , , and . AAAI, page 14440-14448. AAAI Press, (2024)A Blockchain Based Liability Attribution Framework for Autonomous Vehicles., , , and . CoRR, (2018)HoneyCode: Automating Deceptive Software Repositories with Deep Generative Models., , , and . HICSS, page 1-10. ScholarSpace, (2021)A Game-Theoretic Approach to Quality Improvement in Crowdsourcing Tasks., , and . ASSRI, volume 234 of Lecture Notes in Business Information Processing, page 116-130. Springer, (2017)Reminder Care System: An Activity-Aware Cross-Device Recommendation System., , , , , and . ADMA, volume 11888 of Lecture Notes in Computer Science, page 207-220. Springer, (2019)Exploiting constrained IoT devices in a trustless blockchain-based water management system., , , and . IEEE ICBC, page 1-7. IEEE, (2020)