Department of Electrical Engineering & Computer Science

Search results

  • Conference contribution

    RHIK: Re-configurable Hash-based Indexing for KVSSD

    Saha, M. P., Kim, B. S., Gunawi, H. S. & Bhimani, J., Aug 7 2023, HPDC 2023 - Proceedings of the 32nd International Symposium on High-Performance Parallel and Distributed Computing. Association for Computing Machinery, Inc, p. 319-320 2 p. (HPDC 2023 - Proceedings of the 32nd International Symposium on High-Performance Parallel and Distributed Computing).

    Research output: Chapter in Book/Entry/PoemConference contribution

    1 Scopus citations
  • Risk-based routing protocol for wireless ad-hoc networks

    Alarifi, A. & Du, W., 2005, Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05. p. 161-165 5 p. (Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • Robust adaptive beamforming based on interference covariance matrix reconstruction and mismatched steering vector compensation

    Yan, L., Yang, X., Xi, W., Zhang, Z. & Sarkar, T. K., Dec 18 2014, Proceedings of 3rd Asia-Pacific Conference on Antennas and Propagation, APCAP 2014. Institute of Electrical and Electronics Engineers Inc., p. 189-192 4 p. 6992449. (Proceedings of 3rd Asia-Pacific Conference on Antennas and Propagation, APCAP 2014).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Robust and reliable step counting by mobile phone cameras

    Ozcan, K. & Velipasalar, S., Sep 8 2015, 9th International Conference on Distributed Smart Cameras, ICDSC 2015. Association for Computing Machinery, p. 164-169 6 p. (ACM International Conference Proceeding Series; vol. 08-11-Sep-2015).

    Research output: Chapter in Book/Entry/PoemConference contribution

    15 Scopus citations
  • Robust Deep Reinforcement Learning Based Network Slicing under Adversarial Jamming Attacks

    Wang, F., Gursoy, M. C., Velipasalar, S. & Sagduyu, Y. E., 2022, 2022 IEEE 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2022. Institute of Electrical and Electronics Engineers Inc., p. 752-757 6 p. (IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC; vol. 2022-September).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Robust detection of random events with spatially correlated data in wireless sensor networks via distributed compressive sensing

    Wimalajeewa, T. & Varshney, P. K., Mar 9 2018, 2017 IEEE 7th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, CAMSAP 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. 8313148. (2017 IEEE 7th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, CAMSAP 2017; vol. 2017-December).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • Robust Distributed Detection in Massive MIMO Wireless Sensor Networks under CSI Uncertainty

    Chawla, A., Patel, A., Jagannatham, A. K. & Varshney, P. K., Jul 2 2018, 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8690918. (IEEE Vehicular Technology Conference; vol. 2018-August).

    Research output: Chapter in Book/Entry/PoemConference contribution

    6 Scopus citations
  • Robust footstep counting and traveled distance calculation by mobile phones incorporating camera geometry

    Lu, Y. & Velipasalar, S., Aug 3 2016, 2016 IEEE International Conference on Image Processing, ICIP 2016 - Proceedings. IEEE Computer Society, p. 464-468 5 p. 7532400. (Proceedings - International Conference on Image Processing, ICIP; vol. 2016-August).

    Research output: Chapter in Book/Entry/PoemConference contribution

    1 Scopus citations
  • Robust Incentive Tree Design for Mobile Crowdsensing

    Zhang, X., Xue, G., Yu, R., Yang, D. & Tang, J., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 458-468 11 p. 7979991. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Entry/PoemConference contribution

    19 Scopus citations
  • Robust MIMO Communications Against Antenna Blockage and Interference

    Liu, Y., Chen, B., Mroczek, J. J., Malowicki, J. E. & Michalak, R. J., Nov 2019, MILCOM 2019 - 2019 IEEE Military Communications Conference. Institute of Electrical and Electronics Engineers Inc., 9020916. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2019-November).

    Research output: Chapter in Book/Entry/PoemConference contribution

    1 Scopus citations
  • Robustness of feedforward neural networks

    Chiu, C. T., Mehrotra, K., Mohan, C. K. & Ranka, S., 1993, 1993 IEEE International Conference on Neural Networks, ICNN 1993. Institute of Electrical and Electronics Engineers Inc., p. 783-788 6 p. 298655. (IEEE International Conference on Neural Networks - Conference Proceedings; vol. 1993-January).

    Research output: Chapter in Book/Entry/PoemConference contribution

    16 Scopus citations
  • Robust Primal-Dual Proximal Algorithm for Cooperative Localization in WSNs

    Zhang, M., Shen, X., Wang, Z. & Varshney, P. K., 2024, FUSION 2024 - 27th International Conference on Information Fusion. Institute of Electrical and Electronics Engineers Inc., (FUSION 2024 - 27th International Conference on Information Fusion).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • Robust resource provisioning in time-varying edge networks

    Yu, R., Xue, G., Wan, Y., Tang, J., Yang, D. & Ji, Y., Oct 11 2020, MobiHoc 2020 - Proceedings of the 2020 International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing. Association for Computing Machinery, p. 21-30 10 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Robust sparse Bayesian learning STAP method for discrete interference suppression in nonhomogeneous clutter

    Sun, Y., Yang, X., Long, T. & Sarkar, T. K., Jun 7 2017, 2017 IEEE Radar Conference, RadarConf 2017. Institute of Electrical and Electronics Engineers Inc., p. 1003-1008 6 p. 7944350. (2017 IEEE Radar Conference, RadarConf 2017).

    Research output: Chapter in Book/Entry/PoemConference contribution

    7 Scopus citations
  • Robust suboptimal decision fusion in wireless sensor networks

    Jiang, R., Misra, S., Chen, B. & Swami, A., 2005, MILCOM 2005: Military Communications Conference 2005. 1605981. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2005).

    Research output: Chapter in Book/Entry/PoemConference contribution

    11 Scopus citations
  • Role of Academia to Create Re-entry Pathways in Computing

    Billionniere, E., Rahman, F., Brown, Q. & Seo, H., Mar 10 2020, 2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology, RESPECT 2020 - Proceedings. Gardner-McCune, C., Washington, N., Dillon, E., Washington, G. & Payton, J. (eds.). Institute of Electrical and Electronics Engineers Inc., 9272425. (2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology, RESPECT 2020 - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Room shape reconstruction with a single mobile acoustic sensor

    Peng, F., Wang, T. & Chen, B., Feb 23 2016, 2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015. Institute of Electrical and Electronics Engineers Inc., p. 1116-1120 5 p. 7418371. (2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015).

    Research output: Chapter in Book/Entry/PoemConference contribution

    12 Scopus citations
  • Routing wires with non-uniform width and spacing in data paths

    Krishna, B., Chen, C. Y. R. & Sehgal, N. K., 1999, ICM 1999 - 11th International Conference on Microelectronics. Institute of Electrical and Electronics Engineers Inc., p. 85-88 4 p. 884811. (Proceedings of the International Conference on Microelectronics, ICM; vol. 2000-January).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • RSS-Based Detection of Drones in the Presence of RF Interferers

    Sinha, P., Yapici, Y., Guvene, I., Turgut, E. & Cenk Gursoy, M., Jan 2020, 2020 IEEE 17th Annual Consumer Communications and Networking Conference, CCNC 2020. Institute of Electrical and Electronics Engineers Inc., 9045281. (2020 IEEE 17th Annual Consumer Communications and Networking Conference, CCNC 2020).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    5 Scopus citations
  • Rule networks in learning classifier systems

    Kuber, K., Card, S. W., Mehrotra, K. G. & Mohan, C. K., 2014, GECCO 2014 - Companion Publication of the 2014 Genetic and Evolutionary Computation Conference. Association for Computing Machinery, p. 977-982 6 p. (GECCO 2014 - Companion Publication of the 2014 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • SAFE: Similarity-Aware Multi-modal Fake News Detection

    Zhou, X., Wu, J. & Zafarani, R., 2020, Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia Conference, PAKDD 2020, Proceedings. Lauw, H. W., Lim, E.-P., Wong, R.C.-W., Ntoulas, A., Ng, S.-K. & Pan, S. J. (eds.). Springer, p. 354-367 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12085 LNAI).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    238 Scopus citations
  • Sampling community structure in dynamic social networks

    Mensah, H. & Soundarajan, S., 2018, Recent Trends and Future Technology in Applied Intelligence - 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Proceedings. Ait Mohamed, O., Mouhoub, M., Sadaoui, S. & Ali, M. (eds.). Springer Verlag, p. 114-126 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10868 LNAI).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Scalable graph-based bug search for firmware images

    Feng, Q., Zhou, R., Xu, C., Cheng, Y., Testa, B. & Yin, H., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 480-491 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Entry/PoemConference contribution

    373 Scopus citations
  • Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention

    Tang, Y., Li, K., Wang, Y. & Somuncuoglu, S. B., Dec 7 2020, SERIAL 2020 - Proceedings of the 2020 4th Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, Part of Middleware 2020. Association for Computing Machinery, Inc, p. 1-4 4 p. (SERIAL 2020 - Proceedings of the 2020 4th Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, Part of Middleware 2020).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Scalable NoC-based Neuromorphic Hardware Learning and Inference

    Fang, H., Shrestha, A., De Ma, M. & Qiu, Q., Oct 10 2018, 2018 International Joint Conference on Neural Networks, IJCNN 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8489619. (Proceedings of the International Joint Conference on Neural Networks; vol. 2018-July).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    26 Scopus citations
  • Scale estimation with difference of ordered residuals

    Scalzo-Cornacchia, M. & Velipasalar, S., Dec 9 2015, 2015 IEEE International Conference on Image Processing, ICIP 2015 - Proceedings. IEEE Computer Society, p. 3377-3381 5 p. 7351430. (Proceedings - International Conference on Image Processing, ICIP; vol. 2015-December).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • Scattering from arbitrary planar periodic screen consisting of resistive patches and dielectric layers

    Petre, P., Sarkar, T. K., Zombory, L. & Swaminathan, M., 1991, 1991 Digest. IEEE Computer Society, p. 1870-1873 4 p. (AP-S International Symposium (Digest) (IEEE Antennas and Propagation Society); vol. 3).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • SC-DCNN: Highly-scalable deep convolutional neural network using stochastic computing

    Ren, A., Li, Z., Ding, C., Qiu, Q., Wang, Y., Li, J., Qian, X. & Yuan, B., Apr 4 2017, ASPLOS 2017 - 22nd International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery, p. 405-418 14 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS; vol. Part F127193).

    Research output: Chapter in Book/Entry/PoemConference contribution

    79 Scopus citations
  • Scheduling in D2D underlaid cellular networks with deadline constraints

    Li, Y., Cenk Gursoy, M. & Velipasalar, S., Jul 2 2016, 2016 IEEE 84th Vehicular Technology Conference, VTC Fall 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7881211. (IEEE Vehicular Technology Conference; vol. 0).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Schelkunoff integrals for vertical dipoles

    Dyab, W. M., Sarkar, T. K. & Salazar-Palma, M., 2013, 2013 IEEE Antennas and Propagation Society International Symposium, APSURSI 2013 - Proceedings. p. 726-727 2 p. 6711022. (IEEE Antennas and Propagation Society, AP-S International Symposium (Digest)).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • SCUTA: A server-side access control system for web applications

    Tan, X., Du, W., Luo, T. & Soundararaj, K. D., 2012, SACMAT'12 - Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. p. 71-82 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Seamless Deductive Inference via Macros

    Sahebolamri, A., Gilray, T. & Micinski, K., Sep 19 2022, CC 2022 - Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction. Egger, B. & Smith, A. (eds.). Association for Computing Machinery, Inc, p. 77-88 12 p. (CC 2022 - Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction).

    Research output: Chapter in Book/Entry/PoemConference contribution

    8 Scopus citations
  • Searching for better randomized response schemes for privacy-preserving data mining

    Huang, Z., Du, W. & Teng, Z., 2007, Knowledge Discovery in Database: PKDD 2007 - 11th European Conference on Principles and Practice of Knowledge Discovery in Databases, Proceedings. Springer Verlag, p. 487-497 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4702 LNAI).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    2 Scopus citations
  • Second-order plasma enabled tunable low-profile frequency selective surface based on coupling inter-layer

    Payne, K., Peters, E. F., Brunett, J., Wedding, D. K., Wedding, C. A. & Choi, J. H., 2016, European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016. Institute of Electrical and Electronics Engineers Inc., p. 309-312 4 p. 7824340. (European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016).

    Research output: Chapter in Book/Entry/PoemConference contribution

    12 Scopus citations
  • Secrecy capacity of semi-deterministic wire-tap channels

    Grubb, J., Vishwanath, S., Liang, Y. & Poor, H. V., 2007, Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW. p. 199-202 4 p. 4318063. (Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW).

    Research output: Chapter in Book/Entry/PoemConference contribution

    10 Scopus citations
  • Secrecy capacity region of binary and Gaussian multiple access channels

    Liang, Y. & Vincent Poor, H., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 1098-1106 9 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 3).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Secrecy capacity region of fading broadcast channels

    Liang, Y., Poor, H. V. & Shamai, S., 2007, Proceedings - 2007 IEEE International Symposium on Information Theory, ISIT 2007. p. 1291-1295 5 p. 4557401. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    29 Scopus citations
  • Secrecy capacity region of parallel broadcast channels

    Liang, Y., Poor, H. V. & Shamai, S., 2007, 2007 Information Theory and Applications Workshop, Conference Proceedings, ITA. p. 245-250 6 p. 4357587. (2007 Information Theory and Applications Workshop, Conference Proceedings, ITA).

    Research output: Chapter in Book/Entry/PoemConference contribution

    8 Scopus citations
  • Secrecy throughput of MANETs with malicious nodes

    Liang, Y., Poor, H. V. & Ying, L., 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 1189-1193 5 p. 5205992. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    37 Scopus citations
  • Secret key capacity: Talk or keep silent?

    Zhang, H., Liang, Y. & Lai, L., Sep 28 2015, Proceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015. Institute of Electrical and Electronics Engineers Inc., p. 291-295 5 p. 7282463. (IEEE International Symposium on Information Theory - Proceedings; vol. 2015-June).

    Research output: Chapter in Book/Entry/PoemConference contribution

    9 Scopus citations
  • Secret key-private key generation over three terminals: Capacity region

    Zhang, H., Lai, L., Liang, Y. & Wang, H., 2014, 2014 IEEE International Symposium on Information Theory, ISIT 2014. Institute of Electrical and Electronics Engineers Inc., p. 1141-1145 5 p. 6875011. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • Secret sharing via noisy broadcast channels

    Lai, L., Liang, Y., Du, W. & Shamai, S., 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations
  • Secure and efficient multi-party directory publication for privacy-preserving data sharing

    Areekijseree, K., Tang, Y., Chen, J., Wang, S., Iyengar, A. & Palanisamy, B., 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Li, Y., Chang, B., Zhu, S. & Beyah, R. (eds.). Springer Verlag, p. 71-94 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 254).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Secure and Private Sequence Comparisons

    Atallah, M. J., Kerschbaum, F. & Du, W., 2003, Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003. Samarati, P. & Syverson, P. (eds.). Association for Computing Machinery, p. 39-44 6 p. (Proceedings of the ACM Workshop on Privacy in the Electronic Society).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    153 Scopus citations
  • Secure coding over networks

    Xu, J. & Chen, B., 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2116-2120 5 p. 5205251. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Secure communication over fading channels

    Liang, Y. & Poor, H. V., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 817-823 7 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 2).

    Research output: Chapter in Book/Entry/PoemConference contribution

    44 Scopus citations
  • Secure consistency verification for untrusted cloud storage by public blockchains

    Li, K., Tang, Y., Kim, B. H. B. & Xu, J., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K.-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 39-62 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    3 Scopus citations
  • Secure distributed detection in the presence of eavesdroppers

    Nadendla, V. S. S., Chen, H. & Varshney, P. K., 2010, Conference Record of the 44th Asilomar Conference on Signals, Systems and Computers, Asilomar 2010. p. 1437-1441 5 p. 5757773. (Conference Record - Asilomar Conference on Signals, Systems and Computers).

    Research output: Chapter in Book/Entry/PoemConference contribution

    18 Scopus citations
  • Secure nested codes for type II wiretap channels

    Liu, R., Liang, Y., Poor, H. V. & Spasojević, P., 2007, 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings. p. 337-342 6 p. 4313097. (2007 IEEE Information Theory Workshop, ITW 2007, Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    85 Scopus citations
  • Securing BGP through keychain-based signatures

    Heng, Y., Bo, S., Haining, W. & Jianping, P., 2007, 2007 Fifteenth IEEE International Workshop on Quality of Service, IWQoS 2007. p. 154-163 10 p. 4262466. (IEEE International Workshop on Quality of Service, IWQoS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations