Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

REboost: Improving Throughput in Wireless Networks Using Redundancy Elimination., , and . IEEE Communications Letters, 21 (1): 160-163 (2017)What Mobile Ads Know About Mobile Users., , and . NDSS, The Internet Society, (2016)Generic External Memory for Switch Data Planes., , , , and . HotNets, page 1-7. ACM, (2018)On the Criticality of Integrity Protection in 5G Fronthaul Networks., , , , and . USENIX Security Symposium, USENIX Association, (2024)LogNIC: A High-Level Performance Model for SmartNICs., , , , , , and . MICRO, page 916-929. ACM, (2023)Multi-rate combination of opportunistic routing and network coding: An optimization perspective., and . WCNC, page 1947-1952. IEEE, (2012)FLEXDROID: Enforcing In-App Privilege Separation in Android., , , , and . NDSS, The Internet Society, (2016)ATRA: Address Translation Redirection Attack against Hardware-based External Monitors., , , , , and . CCS, page 167-178. ACM, (2014)SounDroid: Supporting Real-Time Sound Applications on Commodity Mobile Devices., , , , and . RTSS, page 285-294. IEEE Computer Society, (2015)TEA: Enabling State-Intensive Network Functions on Programmable Switches., , , , , , and . SIGCOMM, page 90-106. ACM, (2020)