Author of the publication

Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild.

, , , , , , and . EuroS&P, page 332-351. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach for adaptive associative classification., , , and . Expert Syst. Appl., 38 (9): 11873-11883 (2011)Comparing Apples with Oranges? The Perceived Differences between Agile and Lean Software Development Processes., and . ICIS, Association for Information Systems, (2011)Understanding agility in software development through a complex adaptive systems perspective., and . ECIS, page 2182-2193. (2009)An improved feature fusion algorithm for image retrieval., , and . CISP-BMEI, page 384-389. IEEE, (2016)Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery., , , , and . JAMIA, 22 (1): 100-108 (2015)A Recommendation Algorithm Based on Belief Propagation and Probability Matrix Factorization., , and . DASC/PiCom/CBDCom/CyberSciTech, page 392-398. IEEE, (2020)MVP and experimentation in software startups: a qualitative survey., , , , and . SEAA, page 322-325. IEEE, (2020)Mitigating bandwidth-exhaustion attacks using congestion puzzles., and . CCS, page 257-267. ACM, (2004)Fragile mixing., and . CCS, page 227-235. ACM, (2004)Privacy-preserving genomic computation through program specialization., , , , , and . ACM Conference on Computer and Communications Security, page 338-347. ACM, (2009)