Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations., , , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 162-182. Springer, (2023)Localizing Discriminative Visual Landmarks for Place Recognition., , , , , , , and . ICRA, page 5979-5985. IEEE, (2019)Visual Localization in Changing Environments using Place Recognition Techniques., , , , , and . ICPR, page 1785-1790. IEEE Computer Society, (2018)Probabilistic Voting for Sequence Based Visual Place Recognition., , , , and . ICPR, page 1791-1796. IEEE Computer Society, (2018)Visual place recognition with CNNs: From global to partial., , , , and . IPTA, page 1-6. IEEE, (2017)On pilot design for channel estimation and MUI reduction in uplink OFDMA systems., , , and . WCNC, page 88-93. IEEE, (2009)Revisiting Application Offloads on Programmable Switches., , , and . IFIP Networking, page 1-9. IEEE, (2022)NeoBFT: Accelerating Byzantine Fault Tolerance Using Authenticated In-Network Ordering., , , , and . SIGCOMM, page 239-254. ACM, (2023)Applying Problem Frames in Behavior-Driven Development for Smart Cone System., , , , , and . APSEC, page 566-567. IEEE, (2021)In-network defense against AR-DDoS attacks., , , and . SIGCOMM Posters and Demos, page 18-20. ACM, (2020)