Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FENCE: continuous access control enforcement in dynamic data stream environments., , and . CODASPY, page 243-254. ACM, (2013)Secure and resilient proximity-based access control., , , , and . DARE@CIKM, page 15-20. ACM, (2013)StreamShield: a stream-centric approach towards security and privacy in data stream environments., , , and . SIGMOD Conference, page 1027-1030. ACM, (2009)A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks., , , and . ICDE, page 1192-1203. IEEE Computer Society, (2012)Assuring Data Trustworthiness - Concepts and Research Challenges., and . Secure Data Management, volume 6358 of Lecture Notes in Computer Science, page 1-12. Springer, (2010)Continuous query processing in data streams using duality of data and queries., , , , and . SIGMOD Conference, page 313-324. ACM, (2006)Neural Network With Binary Cross Entropy for Antenna Selection in Massive MIMO Systems: Convolutional Neural Network Versus Fully Connected Network., and . IEEE Access, (2023)High-Assurance Integrity Techniques for Databases., , , and . BNCOD, volume 5071 of Lecture Notes in Computer Science, page 244-256. Springer, (2008)Similar sequence matching supporting variable-length and variable-tolerance continuous queries on time-series data stream., , and . Inf. Sci., 178 (6): 1461-1478 (2008)Authenticated Top-K Aggregation in Distributed and Outsourced Databases., , and . SocialCom/PASSAT, page 779-788. IEEE Computer Society, (2012)