1. Defending hash tables from algorithmic complexity attacks with resource burning;Theoretical Computer Science;2024-10
2. Defending Hash Tables from Subterfuge with Depth Charge;Proceedings of the 25th International Conference on Distributed Computing and Networking;2024-01-04
3. Kadcast-NG: A Structured Broadcast Protocol for Blockchain Networks;IEEE/ACM Transactions on Networking;2023-12
4. AccountNet: Accountable Data Propagation Using Verifiable Peer Shuffling;2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS);2023-07
5. Received Signal Strength and Optimized Support Vector Machine based Sybil Attack Detection Scheme in Smart Grid;2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT);2023-01-19