From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Robust secret key extraction from channel secondary random process., , , , , и . Wirel. Commun. Mob. Comput., 16 (11): 1389-1400 (2016)Secret Key Generation Based on AoA Estimation for Low SNR Conditions., , , , , и . VTC Spring, стр. 1-7. IEEE, (2015)On the Secure Degrees of Freedom of the K-user MAC and 2-user Interference Channels., , и . CoRR, (2016)Video acquisition between USB 2.0 CMOS camera and embedded FPGA system., , , , , , и . ICSPCS, стр. 1-5. IEEE, (2011)Distributed in-network processing and resource optimization over mobile-health systems., , , и . J. Netw. Comput. Appl., (2017)Distributed binary consensus algorithm and wireless sensor network., , и . IWCMC, стр. 1331-1336. IEEE, (2013)Impact of time synchronization error on the mode-shape identification and damage detection/localization in WSNs for structural health monitoring., , и . J. Netw. Comput. Appl., (2017)TOSSIM and distributed binary consensus algorithm in wireless sensor networks., и . J. Netw. Comput. Appl., (2014)The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications., , , , и . IEEE Trans. Control. Netw. Syst., 4 (4): 886-898 (2017)Exploiting spectrum sensing data for key management., , , , и . Comput. Commun., (2017)