Author of the publication

On the security of distributed power system state estimation under targeted attacks.

, and . SAC, page 666-672. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Caching for BitTorrent-Like P2P Systems: A Simple Fluid Model and Its Implications., , , , and . IEEE/ACM Trans. Netw., 20 (4): 1176-1189 (2012)Characterization of SURF and BRISK Interest Point Distribution for Distributed Feature Extraction in Visual Sensor Networks., , and . IEEE Trans. Multimedia, 17 (5): 591-602 (2015)Reliable Video Streaming With Strict Playout Deadline in Multihop Wireless Networks., , , and . IEEE Trans. Multimedia, 19 (10): 2238-2251 (2017)Distributed Algorithms for Feature Extraction Off-loading in Multi-Camera Visual Sensor Networks., , and . CoRR, (2017)Joint Optimization of Service Function Placement and Flow Distribution for Service Function Chaining., , , and . IEEE Journal on Selected Areas in Communications, 35 (11): 2532-2541 (2017)Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks., , and . IEEE Trans. Circuits Syst. Video Techn., 28 (11): 3288-3299 (2018)A Benders Decomposition Approach for Resilient Placement of Virtual Process Control Functions in Mobile Edge Clouds., and . IEEE Trans. Network and Service Management, 15 (4): 1460-1472 (2018)Are Multiple Descriptions Better Than One?., , and . NETWORKING, volume 3462 of Lecture Notes in Computer Science, page 684-696. Springer, (2005)Packet Size Distribution: An Aside?., , and . QoS-IP, volume 3375 of Lecture Notes in Computer Science, page 75-87. Springer, (2005)A Longitudinal Characterization of Local and Global BitTorrent Workload Dynamics., , , and . PAM, volume 7192 of Lecture Notes in Computer Science, page 252-262. Springer, (2012)