Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MalFlow: identification of C&C servers through host-based data flow profiling., , , , , and . SAC, page 2087-2094. ACM, (2016)Distributed and lightweight multi-camera human activity classification., , , and . ICDSC, page 1-8. IEEE, (2009)RIOTNet: Reactive IoT Control Network., , and . iThings/GreenCom/CPSCom/SmartData, page 643-650. IEEE Computer Society, (2017)A very low bit rate video codec with Smart Error Resiliency features for robust wireless video transmission., , and . ICASSP, page 4191. IEEE, (2002)Cascade of Box (CABOX) Filters for Optimal Scale Space Approximation., , , , , and . CVPR Workshops, page 126-131. IEEE Computer Society, (2014)ECG Authentication Neural Network Hardware Design with Collective Optimization of Low Precision and Structured Compression., , , , , , and . ISCAS, page 1-5. IEEE, (2019)PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage., , , , , , and . CoRR, (2017)Energy management scheme for wireless powered D2D users with NOMA underlaying full duplex UAV., , , , , and . DroneCom@MobiCom, page 7-12. ACM, (2020)Topology control in heterogeneous ad-hoc networks., , and . ICON, page 665-670. IEEE, (2004)A fast object detection algorithm using motion-based region-of-interest determination., , and . DSP, page 1105-1108. IEEE, (2002)