Author of the publication

Analyzing the vulnerability of superpeer networks against attack.

, , , and . ACM Conference on Computer and Communications Security, page 225-234. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LouvainNE: Hierarchical Louvain Method for High Quality and Scalable Network Embedding., , , , and . WSDM, page 43-51. ACM, (2020)An algorithm for optimal assignment of a wavelength in a tree topology and its application in WDM networks., , , and . IEEE J. Sel. Areas Commun., 22 (9): 1589-1600 (2004)LASO: Exploiting Locomotive and Acoustic Signatures over the Edge to Annotate IMU Data for Human Activity Recognition., , , , , and . ICMI, page 333-342. ACM, (2020)"Whom-to-interact": does conference networking boost your citation count?, , and . CODS, page 39-48. ACM, (2015)Temporal Sequence of Retweets Help to Detect Influential Nodes in Social Networks., , , , and . IEEE Trans. Comput. Social Systems, 6 (3): 441-455 (2019)My Mobile Knows That I am Driving! In-Vehicle (Relative) Blind Localization of a Smartphone., , , , and . MDM, page 494-499. IEEE, (2022)Demo: Automated Micro-Activity Annotations for Human Activity Recognition with Inertial Sensing., , and . SMARTCOMP, page 162-164. IEEE, (2022)ActivPass: Your Daily Activity is Your Password., , , , and . CHI, page 2325-2334. ACM, (2015)On the Role of Micro-categories to Characterize Event Popularity in Meetup., , , and . ICWSM, page 71-82. AAAI Press, (2021)I Cannot See Students Focusing on My Presentation; Are They Following Me? Continuous Monitoring of Student Engagement through "Stungage"., , and . UMAP, page 243-253. ACM, (2022)