Author of the publication

RL-Sketch: Scaling Reinforcement Learning for Adaptive and Automate Anomaly Detection in Network Data Streams.

, , and . LCN, page 340-347. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable Team Multicast in Wireless Ad hoc Networks Exploiting Coordinated Motion., , and . Networked Group Communication, page 97-104. ACM, (2002)A Secure Data Transmission Scheme for Mobile Ad Hoc Networks., , , and . GLOBECOM, page 1006-1010. IEEE, (2007)Modeling Worm Propagation through Hidden Wireless Connections., , and . GLOBECOM, page 1-7. IEEE, (2009)Multiple Radio Channel Assignement Utilizing Partially Overlapped Channels., , and . GLOBECOM, page 1-7. IEEE, (2009)Critical Phase of Connectivity in Wireless Network Expansion., and . GLOBECOM, page 1-5. IEEE, (2010)Privacy-preserving secure relative localization in vehicular networks., , and . Secur. Commun. Networks, 1 (3): 195-204 (2008)An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks., , and . IEEE Trans. Mob. Comput., 6 (8): 888-902 (2007)SALS: semantics-aware location sharing based on cloaking zone in mobile social networks., , , and . MobiGIS, page 49-56. ACM, (2012)C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs., , , , , and . WCNC, page 879-884. IEEE, (2000)Experimental evaluation of LANMAR, a scalable ad-hoc routing protocol., , , , , and . WCNC, page 2032-2037. IEEE, (2005)