Author of the publication

Modeling and optimization for programmable unified control plane in heterogeneous wireless networks.

, , and . Sarnoff Symposium, page 37-42. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MANDA: On Adversarial Example Detection for Network Intrusion Detection System., , , , and . INFOCOM, page 1-10. IEEE, (2021)Towards Optimal Tradeoff Between Data Freshness and Update Cost in Information-update Systems., , , , and . ICCCN, page 1-10. IEEE, (2022)Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning., , , , , and . ACSAC, page 647-657. ACM, (2022)Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels., , and . CISS, page 606-611. IEEE, (2009)Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking., , , , , , and . AsiaCCS, page 71-82. ACM, (2013)AugAuth: Shoulder-surfing resistant authentication for augmented reality., , , , , and . ICC, page 1-6. IEEE, (2017)On Multicast Throughput in Multihop MIMO Networks With Interference Alignment., , , , , , and . IEEE Trans. Veh. Technol., 67 (7): 6627-6641 (2018)A Survey of Distributed Consensus Protocols for Blockchain Networks., , , and . CoRR, (2019)Sparse Time-Frequency decomposition for multiple signals with same frequencies., and . CoRR, (2015)Memory Forensic Challenges Under Misused Architectural Features., , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (9): 2345-2358 (2018)