Search for persons
X
?
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) ,
1
Impacts of a Single GPS Spoofer on Multiple Receivers: Form..:
, In:
?
Proceedings of the IUTAM Symposium on Optimal Guidance and Control for Autonomous Systems 2023; IUTAM Bookseries ,
2
Identifying Consumer Drones via Encrypted Traffic:
, In:
?
2023 IEEE International Conference on Big Data (BigData) ,
3
Detecting Compromised IoT Devices Using Autoencoders with S..:
, In:
?
2023 IEEE Conference on Communications and Network Security (CNS) ,
4
Authenticating Outsourced Location-Based Skyline Queries un..:
, In:
?
GLOBECOM 2022 - 2022 IEEE Global Communications Conference ,
5
IoT Device Identification Based on Network Traffic Characte..:
, In:
?
2019 International Conference on Unmanned Aircraft Systems (ICUAS) ,
6
Compromising Flight Paths of Autopiloted Drones:
, In:
?
2019 IEEE Conference on Communications and Network Security (CNS) ,
7
FileCrypt: Transparent and Scalable Protection of Sensitive..:
, In:
?
2019 IEEE Conference on Communications and Network Security (CNS) ,
8
Manipulating Drone Position Control:
, In:
?
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 ,
9
Implementation of Chaotic Analysis on Retweet Time Series:
, In:
?
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining ,
10
Cascading failures of social networks under attacks:
, In:
?
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining ,
11
A new rumor propagation model and control strategy on socia..:
, In:
?
Proceedings of the 27th Annual Computer Security Applications Conference ,
12
"Super nodes" in Tor : existence and security implicatio:
, In:
?
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference ,
13
Blocking spam by separating end-user machines from legitima..:
, In:
?
Proceedings of the 2009 ACM symposium on Applied Computing ,
14
Practical distributed voter-verifiable secret ballot system:
, In:
?
Proceedings of the 2007 international conference on Wireless communications and mobile computing ,
15