Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Selective Modification in Vehicular Edge Computing., , , and . VTC Fall, page 1-5. IEEE, (2019)A Quantum Safe Authentication Protocol for Remote Keyless Entry Systems in Cars., , and . VTC Fall, page 1-7. IEEE, (2023)NPRA: A Novel Predictive Resource Allocation Mechanism for Next Generation Network Slicing., , , and . CCNC, page 716-721. IEEE, (2023)JaDe: Low Power Jamming Detection Using Machine Learning in Vehicular Networks., and . IEEE Wirel. Commun. Lett., 10 (10): 2210-2214 (2021)Trust-based adversary detection in edge computing assisted vehicular networks., and . J. Commun. Networks, 24 (4): 451-462 (August 2022)PREVENT: A Mechanism for Preventing Message Tampering Attacks in Electric Vehicle Networks., , and . VTC2023-Spring, page 1-5. IEEE, (2023)Detecting Selective Forwarding using Sentinels in lustered IoT Networks., , , , and . GLOBECOM, page 1-6. IEEE, (2020)PIC: Preserving Data Integrity in UAV Assisted Communication., , , and . INFOCOM Workshops, page 1-6. IEEE, (2022)MaDe: Malicious Aerial Vehicle Detection using Generalized Likelihood Ratio Test., , , and . ICC, page 1-6. IEEE, (2022)D3T: Double Deep Q-Network Decision Transformer for Service Function Chain Placement., , , and . HPSR, page 167-172. IEEE, (2023)