Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions., , , , and . WISE (1), volume 13080 of Lecture Notes in Computer Science, page 3-13. Springer, (2021)Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions., , , and . AAAI, page 14440-14448. AAAI Press, (2024)Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy., , , , , and . Sensors, 21 (13): 4354 (2021)A Decentralized Peer-to-Peer Remote Health Monitoring System., , , , and . Sensors, 20 (6): 1656 (2020)HoneyCode: Automating Deceptive Software Repositories with Deep Generative Models., , , and . HICSS, page 1-10. ScholarSpace, (2021)A Game-Theoretic Approach to Quality Improvement in Crowdsourcing Tasks., , and . ASSRI, volume 234 of Lecture Notes in Business Information Processing, page 116-130. Springer, (2017)Contextual Bandit Learning for Activity-Aware Things-of-Interest Recommendation in an Assisted Living Environment., , , , and . ADC, volume 12610 of Lecture Notes in Computer Science, page 37-49. Springer, (2021)Exploiting constrained IoT devices in a trustless blockchain-based water management system., , , and . IEEE ICBC, page 1-7. IEEE, (2020)Trust Management in Decentralized IoT Access Control System., , , and . IEEE ICBC, page 1-9. IEEE, (2020)Leveraging lightweight blockchain to establish data integrity for surveillance cameras., , , , and . IEEE ICBC, page 1-3. IEEE, (2020)