Author of the publication

On exploiting cognitive radio to mitigate interference in macro/femto heterogeneous networks.

, , , and . IEEE Wirel. Commun., 18 (3): 40-47 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Retransmission-Based Access Class Barring for Machine Type Communications., , and . IoTaaS, volume 246 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 145-154. Springer, (2017)Modeling Key Caching for Mobile IP Authentication, Authorization, and Accounting (AAA) Services., , and . IEEE Trans. Vehicular Technology, 58 (7): 3596-3608 (2009)Power-efficient routing mechanism for ODMA systems., , and . IEEE Trans. Vehicular Technology, 55 (4): 1311-1319 (2006)Duality on timing alignment and radio resources orthogonality toward 5G heterogeneous networks., , and . VITAE, page 1-5. IEEE, (2014)On exploiting SDN to facilitate IPv4/IPv6 coexistence and transition., , , and . DSC, page 473-474. IEEE, (2017)Security Threats to xApps Access Control and E2 Interface in O-RAN., , , and . IEEE Open J. Commun. Soc., (2024)Joint Beamforming and Power Allocation for M2M/H2H Co-Existence in Green Dynamic TDD Networks: Low-Complexity Optimal Designs., , , , and . IEEE Internet Things J., 9 (6): 4799-4815 (2022)3GPP NR Sidelink Transmissions Toward 5G V2X., , , , , , and . IEEE Access, (2020)IoT malware classification based on reinterpreted function-call graphs., , , , and . Comput. Secur., (2023)IoT Malware Detection Using Function-Call-Graph Embedding., , , , and . PST, page 1-9. IEEE, (2021)