Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Policing Strategy for Traffic Violation Prevention., , and . CoRR, (2019)On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks., , , and . Mob. Networks Appl., 12 (5-6): 347-357 (2007)Impact of Jamming Attacks on Vehicular Cooperative Adaptive Cruise Control Systems., , and . IEEE Trans. Veh. Technol., 69 (11): 12679-12693 (2020)Kernel Neighborhood Rough Sets Model and Its Application., and . Complex., (2018)Online Learning With Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks., , , , and . IEEE/ACM Trans. Netw., 26 (5): 2268-2281 (2018)Local Adaptive Illumination-Driven Input-Level Fusion for Infrared and Visible Object Detection., , , , , and . Remote. Sens., 15 (3): 660 (February 2023)Efficient Data Capturing for Network Forensics in Cognitive Radio Networks., , and . IEEE/ACM Trans. Netw., 22 (6): 1988-2000 (2014)Chaining for securing data provenance in distributed information networks., , , and . MILCOM, page 1-6. IEEE, (2012)Platoon Stability and Safety Analysis of Cooperative Adaptive Cruise Control under Wireless Rician Fading Channels and Jamming Attacks., , and . CoRR, (2017)Public-Key Encryption With Tester Verifiable Equality Test for Cloud Computing., , , and . IEEE Trans. Cloud Comput., 11 (4): 3396-3406 (October 2023)