Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Evaluation of Homing-Pigeon Based Delay Tolerant Networks with Periodic Scheduling., , and . ICC, page 1-5. IEEE, (2009)On the Optimal Linear Network Coding Design for Information Theoretically Secure Unicast Streaming., , , , and . IEEE Trans. Multim., 18 (6): 1149-1162 (2016)Energy Efficient Robust Beamforming and Cooperative Jamming Design for IRS-Assisted MISO Networks., , , and . CoRR, (2020)Second-Order Fine-Tuning without Pain for LLMs: A Hessian Informed Zeroth-Order Optimizer., , , , , and . CoRR, (2024)Computation Rate Maximization in UAV-Enabled Wireless Powered Mobile-Edge Computing Systems., , , and . CoRR, (2018)An efficient security protocol for advanced metering infrastructure in smart grid., , , , and . IEEE Netw., 27 (4): 1-0 (2013)Vehicle Safety Improvement through Deep Learning and Mobile Sensing., , , , and . IEEE Netw., 32 (4): 28-33 (2018)An adaptive security protocol for a wireless sensor-based monitoring network in smart grid transmission lines., , , , , and . Secur. Commun. Networks, 9 (1): 60-71 (2016)Artificial frequency selective channel for covert cyclic delay diversity orthogonal frequency division multiplexing transmission., , and . Secur. Commun. Networks, 8 (9): 1707-1716 (2015)Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning., , , and . IEEE Trans. Inf. Forensics Secur., (2022)