Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks., , , , , and . IEEE Trans. Parallel Distrib. Syst., 25 (8): 2190-2200 (2014)Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources., , , and . IEEE Trans. Parallel Distrib. Syst., 26 (6): 1732-1742 (2015)Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness., , , , , , and . SADFE, page 1-3. IEEE Computer Society, (2011)Distributed collaborative space-time block codes for two-way relaying network., , , and . WCNC, page 3403-3407. IEEE, (2013)Theorizing a Two-Sided Adoption Model for Mobile Marketing Platforms., , , and . ICIS, page 128. Association for Information Systems, (2010)Privacy in Online Social Networks., , and . ICIS, Association for Information Systems, (2011)A Graph-Based Method for Image Segmentation in Cross-Region., and . CSSE (1), page 1001-1004. IEEE Computer Society, (2008)A Dictionary-Based Multi-Corpora Text Compression System., , and . DCC, page 448. IEEE Computer Society, (2003)The effects of mechanical stimulation on proliferation and CTGF expression of human lung fibroblast., , , and . BMEI, page 1537-1540. IEEE, (2011)Verification of a real time scheduling protocol of safety-critical systems., , , and . CSCWD, page 286-291. IEEE, (2015)