From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Location spoofing attack and its countermeasures in database-driven cognitive radio networks., , и . CNS, стр. 202-210. IEEE, (2014)Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems: poster., , , и . MobiCom, стр. 473-474. ACM, (2016)Incentivizing spectrum sensing in database-driven dynamic spectrum sharing., , , , , , и . INFOCOM, стр. 1-9. IEEE, (2016)P2-SAS: preserving users' privacy in centralized dynamic spectrum access systems., , , , , , , и . MobiHoc, стр. 321-330. ACM, (2016)Location robustness in database-driven white spaces network., , и . DySPAN, стр. 354-357. IEEE, (2014)Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset., , , , , , , , и . USENIX Security Symposium, стр. 3935-3952. USENIX Association, (2021)MadeCR: Correlation-based malware detection for cognitive radio., , , и . INFOCOM, стр. 639-647. IEEE, (2015)Poster: Privacy-Preserving Server-Driven Dynamic Spectrum Access System., , и . MobiCom, стр. 218-220. ACM, (2015)Poster: Location Verification and Recovery for Mobile In-Vehicle Applications., , , и . MobiSys, стр. 497. ACM, (2015)A Practical GPS Location Spoofing Attack in Road Navigation Scenario., , , , и . HotMobile, стр. 85-90. ACM, (2017)