From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains., , , , и . CoRR, (2020)Towards a theory for securing time synchronization in wireless sensor networks., , , и . WISEC, стр. 201-212. ACM, (2009)(Smart)watch your taps: side-channel keystroke inference attacks using smartwatches., , , и . ISWC, стр. 27-30. ACM, (2015)BayBFed: Bayesian Backdoor Defense for Federated Learning., , , , и . SP, стр. 737-754. IEEE, (2023)Seer Grid: Privacy and Utility Implications of Two-Level Load Prediction in Smart Grids., , , , и . IEEE Trans. Parallel Distributed Syst., 28 (2): 546-557 (2017)On the scalable collection of metering data in smart grids through message concatenation., , и . SmartGridComm, стр. 318-323. IEEE, (2013)An Investigative Study on the Privacy Implications of Mobile E-scooter Rental Apps., , , и . WISEC, стр. 125-139. ACM, (2022)Towards a Theory of Robust Localization Against Malicious Beacon Nodes., , , и . INFOCOM, стр. 1391-1399. IEEE, (2008)A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables., , , , , и . CoRR, (2018)Keystroke inference using ambient light sensor on wrist-wearables: a feasibility study., , и . WearSys@MobiSys, стр. 21-26. ACM, (2018)