Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Area Description Framework for Physical Layer Authentication., , , and . WCNC, page 1-6. IEEE, (2019)A Generic Mathematical Model Based on Fuzzy Set Theory for Frequency Reuse in Cellular Networks., , , , and . IEEE J. Sel. Areas Commun., 31 (5): 861-869 (2013)A comparative analysis of diffusion-weighted imaging and ultrasound in thyroid nodules., , , and . BMC Medical Imaging, 19 (1): 92:1-92:6 (2019)Transport Capacity of Distributed Wireless CSMA Networks., , , and . IEEE Trans. Wirel. Commun., 13 (10): 5635-5647 (2014)Fast Cross Layer Authentication Scheme for Dynamic Wireless Network., , , and . WCNC, page 1-6. IEEE, (2020)Artificial Noise Assisted Communication in the Multiuser Downlink: Optimal Power Allocation., , and . IEEE Communications Letters, 19 (2): 295-298 (2015)Analytical SER Performance Bound of M-QAM MIMO System with ZF-SIC Receiver., , and . ICC, page 5103-5107. IEEE, (2008)Low Complexity Hardware Implementation of V-BLAST Receiver., , , and . VTC Spring, page 1355-1359. IEEE, (2008)Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks., , , and . IEEE Access, (2018)Use of Two-Mode Transceiver Circuitry and Its Cross-Layer Energy Efficiency Analysis., , , and . IEEE Communications Letters, 21 (9): 2065-2068 (2017)