Author of the publication

Evaluation of privacy preserving algorithms using traffic knowledge based adversary models.

, , , , and . ITSC, page 1075-1082. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced tree routing for wireless sensor networks., , and . Ad Hoc Networks, 7 (3): 638-650 (2009)Histogram modification based robust image watermarking approach., , , , and . IJMIS, 1 (2): 153-168 (2010)Performance enhancement of I/Q imbalance based wireless device authentication through collaboration of multiple receivers., , and . ICC, page 939-944. IEEE, (2014)An Isolated High-Frequency DC-AC Converter Based on Differential Structure With Ultralow Distortion Output Voltage., , , and . IEEE Trans. Industrial Electronics, 62 (12): 7448-7459 (2015)A Reliable Transport Protocol with Prediction Mechanism for Urgent Information in Wireless Sensor Networks., , , , and . IJDSN, (2013)Evaluation of privacy preserving algorithms using traffic knowledge based adversary models., , , , and . ITSC, page 1075-1082. IEEE, (2011)A condition-based maintenance policy for multi-component systems with a high maintenance setup cost., , and . OR Spectrum, 37 (4): 1007-1035 (2015)On the Inevitability of Online Echo Chambers., , , , , and . CoRR, (2019)Hierarchical Taxonomy-Aware and Attentional Graph Capsule RCNNs for Large-Scale Multi-Label Text Classification., , , , , , , and . CoRR, (2019)DEIsoM: a hierarchical Bayesian model for identifying differentially expressed isoforms using biological replicates., , , , , and . Bioinformatics, 33 (19): 3018-3027 (2017)