Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Denial of Service Attack on Cuckoo Filter Based Networking Systems., and . IEEE Communications Letters, 24 (7): 1428-1432 (2020)HyperLogLog (HLL) Security: Inflating Cardinality Estimates., , and . CoRR, (2020)Scheme for periodical concurrent fault detection in parallel CRC circuits., , , , and . IET Comput. Digit. Tech., 14 (2): 80-85 (2020)Two Bit Overlap: A Class of Double Error Correction One Step Majority Logic Decodable Codes., , , and . IEEE Trans. Computers, 68 (5): 798-803 (2019)Avoiding Flow Size Overestimation in Count-Min Sketch With Bloom Filter Constructions., , , and . IEEE Trans. Netw. Serv. Manag., 18 (3): 3662-3676 (2021)The Logarithmic Dynamic Cuckoo Filter., , , and . ICDE, page 948-959. IEEE, (2021)An Efficient Technique to Protect Serial Shift Registers Against Soft Errors., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 60-II (8): 512-516 (2013)A method to eliminate the event accumulation problem from a memory affected by multiple bit upsets., and . Microelectron. Reliab., 49 (7): 707-715 (2009)A Fingerprint-based Bloom Filter with Deletion Capabilities., , , and . EuCNC, page 453-458. IEEE, (2019)A Polarity-Driven Radiation-Hardened Latch design for Single Event Upset Tolerance., , , , and . DFT, page 1-6. IEEE, (2022)