Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Inspection Points for Malicious Attack Detection in Smart Grids., , , and . COCOON, volume 8591 of Lecture Notes in Computer Science, page 393-404. Springer, (2014)Lottery Ticket Hypothesis: Placing the k-orrect Bets., and . LOD (2), volume 12566 of Lecture Notes in Computer Science, page 228-239. Springer, (2020)Rate alteration attacks in smart grid., , , , and . INFOCOM, page 2353-2361. IEEE, (2015)Optimal packet scan against malicious attacks in smart grids., , , , and . Theor. Comput. Sci., (2016)Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid., , , , , , and . IEEE Access, (2017)Cascading Critical Nodes Detection with Load Redistribution in Complex Systems., , , and . COCOA, volume 8881 of Lecture Notes in Computer Science, page 379-394. Springer, (2014)ARA: Aggregated RAPPOR and Analysis for Centralized Differential Privacy., and . SN Computer Science, 1 (1): 22:1-22:10 (2020)Catastrophic cascading failures in power networks., , , and . Theor. Comput. Sci., (2015)Usage Analysis of Mobile Devices., , , and . ITQM, volume 122 of Procedia Computer Science, page 657-662. Elsevier, (2017)