From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A cost-effective security management for clouds: A game-theoretic deception mechanism., , , и . IM, стр. 98-106. IEEE, (2017)LIPs: A Protocol for Leadership Incentives for Heterogeneous and Dynamic Platoons., , , и . COMPSAC (1), стр. 535-544. IEEE, (2019)On the Age of Pseudonyms in Mobile Ad Hoc Networks., , , и . INFOCOM, стр. 1577-1585. IEEE, (2010)A Social-Aware Approach for Federated IoT-Mobile Cloud using Matching Theory., , и . WF-IoT, стр. 554-559. IEEE, (2019)Revocation games in ephemeral networks., , , и . ACM Conference on Computer and Communications Security, стр. 199-210. ACM, (2008)RADIANCE: Radio-Frequency Adversarial Deep-learning Inference for Automated Network Coverage Estimation., , и . GLOBECOM, стр. 832-837. IEEE, (2023)On Incentive Compatible Role-Based Reward Distribution in Algorand., , , и . DSN, стр. 452-463. IEEE, (2020)Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance., , , и . WEIS, (2012)Cooperation in underwater sensor networks., , и . GAMENETS, стр. 540-548. IEEE, (2009)On non-cooperative location privacy: a game-theoretic analysis., , , и . ACM Conference on Computer and Communications Security, стр. 324-337. ACM, (2009)