Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Streaming Lower Quality Video over LTE: How Much Energy Can You Save?, , , and . ICNP, page 156-167. IEEE Computer Society, (2015)Wireless network coding: Deciding when to flip the switch., , , , , and . INFOCOM, page 260-264. IEEE, (2013)Mitigating malicious interference via subcarrier-level radio agility in wireless networks., , , , , and . ICNP, page 1-10. IEEE Computer Society, (2013)Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud., , , , , and . IEEE/ACM Trans. Netw., 27 (2): 560-576 (2019)BOLT: realizing high throughput power line communication networks., , , , and . CoNEXT, page 39:1-39:13. ACM, (2015)Malicious co-residency on the cloud: Attacks and defense., , , , , and . INFOCOM, page 1-9. IEEE, (2017)Exploiting Subcarrier Agility to Alleviate Active Jamming Attacks in Wireless Networks., , , , , and . IEEE Trans. Mob. Comput., 14 (12): 2488-2501 (2015)A Framework for MIMO-based Packet Header Obfuscation., , , , , , , and . INFOCOM, page 1763-1771. IEEE, (2018)Jaal: Towards Network Intrusion Detection at ISP Scale., , , , , , , , and . CoNEXT, page 134-146. ACM, (2017)RUFC: A flexible framework for reliable UDP with flow control., and . ICITST, page 276-281. IEEE, (2013)