Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximate String Matching for DNS Anomaly Detection., and . SpaCCS, volume 11611 of Lecture Notes in Computer Science, page 490-504. Springer, (2019)Covering Users by a Connected Swarm Efficiently., , and . ALGOSENSORS, volume 12503 of Lecture Notes in Computer Science, page 32-44. Springer, (2020)Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm., and . SSCC, volume 1364 of Communications in Computer and Information Science, page 180-196. Springer, (2020)Reinforcement Learning Based Routing For Deadline-Driven Wireless Communication., , and . WiMob, page 30-35. IEEE, (2023)Finding Geometric Medians with Location Privacy., and . TrustCom, page 1874-1881. IEEE, (2020)Opinion Spam Detection: A New Approach Using Machine Learning and Network-Based Algorithms., , and . ICWSM, page 125-134. AAAI Press, (2022)Automated antenna positioning for wireless networks., , , and . CCNC, page 902-906. IEEE, (2006)Finding Geometric Facilities with Location Privacy., , and . Algorithmica, 85 (12): 3572-3601 (December 2023)An Efficient Connected Swarm Deployment via Deep Learning., and . FedCSIS, volume 25 of Annals of Computer Science and Information Systems, page 1-7. (2021)Poster: Network Performance Upgrade by Cut Spanners., and . Networking, page 1-3. IEEE, (2021)