From post

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks.

, , , и . COCOON, том 9198 из Lecture Notes in Computer Science, стр. 759-770. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How Local Information Improves Rendezvous in Cognitive Radio Networks., , , , , , , и . SECON, стр. 352-360. IEEE, (2018)Efficient Rendezvous for Heterogeneous Interference in Cognitive Radio Networks., , , и . IEEE Trans. Wirel. Commun., 19 (1): 91-105 (2020)A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX., и . Wirel. Commun. Mob. Comput., (2021)A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT., , , и . Remote. Sens., 14 (24): 6371 (декабря 2022)MF2POSE: Multi-task Feature Fusion Pseudo-Siamese Network for intrusion detection using Category-distance Promotion Loss., , , , , , и . Knowl. Based Syst., (января 2024)Adversarial perturbation denoising utilizing common characteristics in deep feature space., , , , , , и . Appl. Intell., 54 (2): 1672-1690 (2024)Fully distributed algorithms for blind rendezvous in cognitive radio networks., , и . MobiHoc, стр. 155-164. ACM, (2014)STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means., , , , , , и . Simul. Model. Pract. Theory, (2022)Adversarial Attacks on ASR Systems: An Overview., , , , , и . CoRR, (2022)Visually imperceptible adversarial patch attacks., , , , , , и . Comput. Secur., (2022)