Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling., , and . IEEE Trans. Mob. Comput., 12 (2): 233-247 (2013)A near-optimal adaptive algorithm for maximizing modularity in dynamic scale-free networks., , , and . J. Comb. Optim., 30 (3): 747-767 (2015)On the complexity and approximation of non-unique probe selection using d -disjunct matrix., and . J. Comb. Optim., 17 (1): 45-53 (2009)Detecting Critical Nodes in Interdependent Power Networks for Vulnerability Assessment., , and . IEEE Trans. Smart Grid, 4 (1): 151-159 (2013)Optimal packet scan against malicious attacks in smart grids., , , , and . Theor. Comput. Sci., (2016)Rate alteration attacks in smart grid., , , , and . INFOCOM, page 2353-2361. IEEE, (2015)Fault tolerant topology control for one-to-all communications in symmetric wireless networks., , , and . IJSNet, 2 (3/4): 163-168 (2007)Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid., , , , , , and . IEEE Access, (2017)Construction of Signaling Pathways with RNAi Data and Multiple Reference Networks., , , , and . IEEE/ACM Trans. Comput. Biology Bioinform., 15 (4): 1079-1091 (2018)ACM SIGMETRICS International Workshop on Critical Infrastructure Network Security., , and . SIGMETRICS Performance Evaluation Review, 46 (2): 48-49 (2018)