Author of the publication

Resource Block Assignment for Interference Avoidance in Femtocell Networks.

, , , , , , and . VTC Fall, page 1-5. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Quantum Communication Protocol Using Insecure Public Channels., , , and . SEC, volume 181 of IFIP, page 113-126. Springer, (2005)Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks., , , , and . IEEE Trans. Inf. Forensics Secur., 9 (1): 109-124 (2014)A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks., , and . SECON, page 1-9. IEEE, (2009)Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications., , , and . IEEE Access, (2020)Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models?, , , , , , , , and . CoRR, (2023)Adversarial Examples Can Be Effective Data Augmentation for Unsupervised Machine Learning., , , , and . AAAI, page 6926-6934. AAAI Press, (2022)Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment., , , , and . ICDCS Workshops, page 18. IEEE Computer Society, (2007)Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release., , , , , , and . AINA, page 1130-1137. IEEE Computer Society, (2017)Safe LoRA: the Silver Lining of Reducing Safety Risks when Fine-tuning Large Language Models., , , , , and . CoRR, (2024)POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions.. ACM Conference on Computer and Communications Security, page 1763-1765. ACM, (2016)