If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2020

AIQL: Enabling efficient attack investigation from system monitoring data

Gao, P., Xiao, X., Li, Z., Jee, K., Xu, F., Kulkarni, S. R. & Mittal, P., Jan 1 2020, Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018. USENIX Association, p. 113-125 13 p. (Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Querying streaming system monitoring data for enterprise system anomaly detection

Gao, P., Xiao, X., Li, D., Jee, K., Chen, H., Kulkarni, S. R. & Mittal, P., Apr 2020, Proceedings - 2020 IEEE 36th International Conference on Data Engineering, ICDE 2020. IEEE Computer Society, p. 1774-1777 4 p. 9101898. (Proceedings - International Conference on Data Engineering; vol. 2020-April).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

Analyzing federated learning through an adversarial lens

Bhagoji, A. N., Chakraborty, S., Mittal, P. & Calo, S., Jan 1 2019, 36th International Conference on Machine Learning, ICML 2019. International Machine Learning Society (IMLS), p. 1012-1021 10 p. (36th International Conference on Machine Learning, ICML 2019; vol. 2019-June).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Analyzing the robustness of open-world machine learning

Sehwag, V., Sitawarin, C., Bhagoji, A. N., Cullina, D., Mittal, P., Song, L. & Chiang, M., Nov 11 2019, AISec 2019 - Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security. Association for Computing Machinery, p. 105-116 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning Informative and Private Representations via Generative Adversarial Networks

Yang, T. Y., Brinton, C., Mittal, P., Chiang, M. & Lan, A., Jan 22 2019, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Song, Y., Liu, B., Lee, K., Abe, N., Pu, C., Qiao, M., Ahmed, N., Kossmann, D., Saltz, J., Tang, J., He, J., Liu, H. & Hu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1534-1543 10 p. 8622089. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Membership inference attacks against adversarially robust deep learning models

Song, L., Shokri, R. & Mittal, P., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy Workshops, SPW 2019. Institute of Electrical and Electronics Engineers Inc., p. 50-56 7 p. 8844607. (Proceedings - 2019 IEEE Symposium on Security and Privacy Workshops, SPW 2019).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Privacy risks of securing machine learning models against adversarial examples

Song, L., Shokri, R. & Mittal, P., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 241-257 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Scopus citations

Robust website fingerprinting through the cache occupancy channel

Shusterman, A., Kang, L., Haskal, Y., Meltser, Y., Mittal, P., Oren, Y. & Yarom, Y., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 639-656 18 p. (Proceedings of the 28th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

SICO: Surgical interception attacks by manipulating BGP communities

Birge-Lee, H., Wang, L., Rexford, J. & Mittal, P., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 431-448 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Scopus citations

Vaccine: Using contextual integrity for data leakage detection

Shvartzshnaider, Y., Wies, T., Pavlinovic, Z., Lakshminarayanan, Mittal, P., Balashankar, A. & Nissenbaum, H., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 1702-1712 11 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Watching you watch: The tracking ecosystem of over-the-top TV streaming devices

Moghaddam, H. M., Acar, G., Burgess, B., Mathur, A., Huang, D. Y., Feamster, N., Felten, E. W., Mittal, P. & Narayanan, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 131-147 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2 Scopus citations
2018

Acoustic denial of service attacks on hard disk drives

Shahrad, M., Mosenia, A., Song, L., Chiang, M., Wentzlaff, D. & Mittal, P., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 34-39 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Adaptive fog-based output security for augmented reality

Ahn, S., Gorlatova, M., Naghizadeh, P., Chiang, M. & Mittal, P., Aug 7 2018, VR/AR Network 2018 - Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, Part of SIGCOMM 2018. Association for Computing Machinery, Inc, p. 1-6 6 p. (VR/AR Network 2018 - Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, Part of SIGCOMM 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Bamboozling certificate authorities with BGP

Birge-Lee, H., Sun, Y., Edmundson, A., Rexford, J. & Mittal, P., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 833-849 17 p. (Proceedings of the 27th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Bayesian Regression for Robust Power Grid State Estimation Following a Cyber-Physical Attack

Soltan, S., Mittal, P. & Poor, H. V., Dec 21 2018, 2018 IEEE Power and Energy Society General Meeting, PESGM 2018. IEEE Computer Society, 8586142. (IEEE Power and Energy Society General Meeting; vol. 2018-August).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

BlackIoT: IoT botnet of high wattage devices can disrupt the power grid

Soltan, S., Mittal, P. & Poor, H. V., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 15-32 18 p. (Proceedings of the 27th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

44 Scopus citations

Blind source separation in the physical layer

Tait, A. N., De Lima, T. F., Ma, P. Y., Chang, M. P., Nahmias, M. A., Shastri, B. J., Mittal, P. & Prucnal, P. R., May 21 2018, 2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Enhancing robustness of machine learning systems via data transformations

Bhagoji, A. N., Cullina, D., Sitawarin, C. & Mittal, P., May 21 2018, 2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. (2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Fundamental Limits of Database Alignment

Cullina, D., Mittal, P. & Kiyavash, N., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., p. 651-655 5 p. 8437908. (IEEE International Symposium on Information Theory - Proceedings; vol. 2018-June).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

How to quantify graph De-anonymization risks

Lee, W. H., Liu, C., Ji, S., Mittal, P. & Lee, R. B., Jan 1 2018, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Mori, P., Camp, O. & Furnell, S. (eds.). Springer Verlag, p. 84-104 21 p. (Communications in Computer and Information Science; vol. 867).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

MVG mechanism: Differential privacy under matrix-valued query

Chanyaswad, T., Dytso, A., Poor, H. V. & Mittal, P., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 230-246 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

SAQL: A stream-based query system for real-time abnormal system behavior detection

Gao, P., Xiao, X., Li, D., Li, Z., Jee, K., Wu, Z., Kim, C. H., Kulkarni, S. R. & Mittal, P., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 639-656 18 p. (Proceedings of the 27th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

SYBILFUSE: Combining local attributes with global structure to perform robust sybil detection

Gao, P., Wang, B., Gong, N. Z., Kulkarni, S. R., Thomas, K. & Mittal, P., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433147. (2018 IEEE Conference on Communications and Network Security, CNS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations
2017

Blind De-anonymization Attacks using Social Networks

Lee, W. H., Ji, S., Liu, C., Mittal, P. & Lee, R. B., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 1-4 4 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks

Zhou, Y., Wagh, S., Mittal, P. & Wentzlaff, D., May 5 2017, Proceedings - 2017 IEEE 23rd Symposium on High Performance Computer Architecture, HPCA 2017. IEEE Computer Society, p. 337-348 12 p. 7920837. (Proceedings - International Symposium on High-Performance Computer Architecture).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks

Sun, Y., Edmundson, A., Feamster, N., Chiang, M. & Mittal, P., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 977-992 16 p. 7958620. (Proceedings - IEEE Symposium on Security and Privacy).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Poster: Inaudible voice commands

Song, L. & Mittal, P., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2583-2585 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Quantification of de-anonymization risks in social networks

Lee, W. H., Liu, C., Ji, S., Mittal, P. & Lee, R., Jan 1 2017, ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). SciTePress, p. 126-135 10 p. (ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy; vol. 2017-January).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

Liu, Z., Liu, Y., Winter, P., Mittal, P. & Hu, Y. C., Nov 21 2017, 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017. IEEE Computer Society, 8117564. (Proceedings - International Conference on Network Protocols, ICNP; vol. 2017-October).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Using EEG-based BCI devices to subliminally probe for private information

Frank, M., Hwu, T., Jain, S., Knight, R. T., Martinovic, I., Mittal, P., Perito, D., Sluganovic, I. & Song, D., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 133-136 4 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
2016

Discriminant-component eigenfaces for privacy-preserving face recognition

Chanyaswad, T., Chang, J. M., Mittal, P. & Kung, S. Y., Nov 8 2016, 2016 IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2016 - Proceedings. Diamantaras, K., Uncini, A., Palmieri, F. A. N. & Larsen, J. (eds.). IEEE Computer Society, 7738871. (IEEE International Workshop on Machine Learning for Signal Processing, MLSP; vol. 2016-November).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

On the relative de-anonymizability of graph data: Quantification and evaluation

Ji, S., Li, W., Yang, S., Mittal, P. & Beyah, R., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524585

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

SmartWalk: Enhancing social network security via adaptive random walks

Liu, Y., Ji, S. & Mittal, P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 492-503 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations
2015

Exploiting temporal dynamics in Sybil defenses

Liu, C., Gao, P., Wright, M. & Mittal, P., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 805-816 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Raptor: Routing attacks on privacy in tor

Sun, Y., Edmundson, A., Vanbever, L., Li, O., Rexford, J., Chiang, M. & Mittal, P., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 271-286 16 p. (Proceedings of the 24th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

58 Scopus citations

Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization

Ji, S., Li, W., Mittal, P., Hu, X. & Beyah, R., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 303-318 16 p. (Proceedings of the 24th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

52 Scopus citations
2014

Anonymity on QuickSand: Using BGP to compromise tor

Vanbever, L., Li, O., Rexford, J. L. & Mittal, P., Oct 27 2014, Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets 2014. Association for Computing Machinery, Inc, 2673869. (Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets 2014).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Re3: Relay reliability reputation for anonymity systems

Das, A., Borisov, N., Mittal, P. & Caesar, M., Jun 4 2014, ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc, p. 63-74 12 p. (ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations
2012

Cachet: A decentralized architecture for privacy preserving social networking with caching

Nilizadeh, S., Jahid, S., Mittal, P., Borisov, N. & Kapadia, A., Dec 1 2012, CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies. p. 337-348 12 p. (CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

68 Scopus citations

DECENT: A decentralized architecture for enforcing privacy in online social networks

Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N. & Kapadia, A., Jun 1 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012. p. 326-332 7 p. 6197504. (2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

56 Scopus citations

Evolution of social-attribute networks: Measurements, modeling, and implications using Google+

Gong, N. Z., Xu, W., Huang, L., Mittal, P., Stefanov, E., Sekar, V. & Song, D., Dec 17 2012, IMC 2012 - Proceedings of the ACM Internet Measurement Conference. p. 131-144 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

113 Scopus citations

SybilControl: Practical sybil defense with computational puzzles

Li, F., Mittal, P., Caesar, M. & Borisov, N., Nov 26 2012, STC'12 - Proceedings of the Workshop on Scalable Trusted Computing. p. 67-78 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Scopus citations
2011

EASiER: Encryption-based access control in social networks with efficient revocation

Jahid, S., Mittal, P. & Borisov, N., May 20 2011, Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. p. 411-415 5 p. (Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

164 Scopus citations

PIR-Tor: Scalable anonymous communication using private information retrieval

Mittal, P., Olumofin, F., Troncoso, C., Borisov, N. & Goldberg, I., Jan 1 2011, Proceedings of the 20th USENIX Security Symposium. USENIX Association, p. 475-490 16 p. (Proceedings of the 20th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting

Mittal, P., Khurshid, A., Juen, J., Caesar, M. & Borisov, N., Nov 14 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 215-226 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

58 Scopus citations
2010

BotGrep: Finding P2P bots with structured graph analysis

Nagaraja, S., Mittal, P., Hong, C. Y., Caesar, M. & Borisov, N., Jan 1 2010, Proceedings of the 19th USENIX Security Symposium. USENIX Association, p. 95-110 16 p. (Proceedings of the 19th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

142 Scopus citations

In search of an anonymous and secure lookup attacks on structured peer-to-peer anonymous communication systems

Wang, Q., Mittal, P. & Borisov, N., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 308-318 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations
2009

ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies

Mittal, P. & Borisov, N., Dec 1 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 161-172 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

43 Scopus citations
2008

Fair k mutual exclusion algorithm for peer to peer systems

Reddy, V. A., Mittal, P. & Gupta, I., Sep 22 2008, Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008. p. 655-662 8 p. 4595939. (Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Information leaks in structured peer-to-peer anonymous communication systems

Mittal, P. & Borisov, N., Dec 1 2008, Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. p. 267-278 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Scopus citations