Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fault Localization Framework to Alleviate the Impact of Execution Similarity., , , and . International Journal of Software Engineering and Knowledge Engineering, 23 (7): 963-998 (2013)An OpenCL micro-benchmark suite for GPUs and CPUs., , , and . The Journal of Supercomputing, 69 (2): 693-713 (2014)Analysis on the "Robust Yet Fragile" Nature of Internet: Load, Capacity and the Cascading Failure Avalanche Effect., , , , and . ICYCS, page 2149-2153. IEEE Computer Society, (2008)Image authentication based on perceptual hash using Gabor filters., , , , and . Soft Comput., 15 (3): 493-504 (2011)How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control., , , , , , and . Multimedia Tools Appl., 77 (14): 18163-18185 (2018)Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks., , , , , and . Computer Networks, (2016)Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage., , , and . Inf. Sci., (2017)Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference., , , , and . Wireless Communications and Mobile Computing, (2018)Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography., , , and . IET Communications, 10 (14): 1795-1802 (2016)Automatic Epileptic Seizure Detection in EEG Signals Using Multi-Domain Feature Extraction and Nonlinear Analysis., , , , , , and . Entropy, 19 (6): 222 (2017)