Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

De-anonymizing bitcoin networks: an IP matching method via heuristic approach: poster., , , and . ACM TUR-C, page 45:1-45:2. ACM, (2019)The collocation of measurement points in large open indoor environment., , , , , , and . INFOCOM, page 2488-2496. IEEE, (2015)Secrecy-based channel assignment for device-to-device communication: An auction approach., , , , and . WCSP, page 1-6. IEEE, (2013)An automatic approach to fingerprint construction of indoor localization by crowd paths., , , and . WCSP, page 1-6. IEEE, (2014)Incentive mechanism for access permission and spectrum trading in femtocell network., , , , and . ICC, page 5959-5963. IEEE, (2013)Cooperative Spectrum Allocation for Cognitive Radio Network: An Evolutionary Approach., , , , , and . ICC, page 1-5. IEEE, (2011)Evolution Framework for Resource Allocation with Local Interaction: An Infection Approach., , , , , and . ICC, page 1-5. IEEE, (2011)Contract-Based Traffic Offloading over Delay Tolerant Networks., , , , , and . GLOBECOM, page 1-6. IEEE, (2015)Modeling Dynamic Adaptive Streaming Over Information-Centric Networking., , , , , and . IEEE Access, (2016)A dynamic unequal energy efficient clustering in Wireless Sensor Network., , , , , and . WCSP, page 1-5. IEEE, (2016)