Author of the publication

Secure Coded Cooperative Computation at the Heterogeneous Edge against Byzantine Attacks.

, , , , and . GLOBECOM, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A generalized optimization framework for control plane in tactical wireless networking., , and . ICNC, page 986-990. IEEE Computer Society, (2017)The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability., , , , , , , , and . MILCOM, page 821-826. IEEE, (2019)Modeling and optimization for programmable unified control plane in heterogeneous wireless networks., , and . Sarnoff Symposium, page 37-42. IEEE, (2016)GENI Deployment and Research at US Army Research Laboratory., and . MILCOM, page 995-1002. IEEE, (2014)Real-Time Camera-to-Lidar Calibration for Autonomous Robotic Systems at the Edge., , , , and . IEEE Big Data, page 3868-3873. IEEE, (2023)Optimization and synchronization of programmable quantum communication channels., and . CoRR, (2018)Dynamic visualization of large scale tactical network simulations., , and . IEEE BigData, page 3951-3954. IEEE, (2019)Visual computation and simulation of path loss effects on tactical networks in urban canyon., , , , and . IEEE BigData, page 3581-3584. IEEE, (2018)Analysis of High fidelity ns-3 simulations to study real-time application performance in tactical wireless networks., , , , , and . IEEE BigData, page 3955-3959. IEEE, (2019)Detecting Network Soft-failures with the Network Link Outlier Factor (NLOF)., , and . IEEE BigData, page 3978-3983. IEEE, (2019)