Author of the publication

Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches.

, and . IEEE Trans. Inf. Forensics Secur., 12 (11): 2611-2626 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game theoretical analysis of the tradeoff between QoE and QoS over satellite channels., , and . ASMS/SPSC, page 24-31. IEEE, (2014)Adversarial Multi-armed Bandit for mmWave Beam Alignment with One-Bit Feedback., , and . VALUETOOLS, page 23-30. ACM, (2019)Learning to be green: robust energy efficiency maximization in dynamic MIMO-OFDM systems., and . CoRR, (2015)Enabling Data Exchange in Interactive State Estimation under Privacy Constraints., , and . CoRR, (2014)Self-Supervised Deep Learning for mmWave Beam Steering Exploiting Sub-6 GHz Channels., , , and . IEEE Trans. Wirel. Commun., 21 (10): 8803-8816 (2022)One-Bit Feedback Exponential Learning for Beam Alignment in Mobile mmWave., , and . IEEE Access, (2020)Gaussian Broadcast Channels with an Orthogonal and Bidirectional Cooperation Link., , and . EURASIP J. Wireless Comm. and Networking, (2008)Energy harvesting in secret key generation systems under jamming attacks., and . ICC, page 1-6. IEEE, (2017)Matrix exponential learning: Distributed optimization in MIMO systems., , and . ISIT, page 3028-3032. IEEE, (2012)Efficient spectrum scheduling and power management for opportunistic users., , and . EURASIP J. Wirel. Commun. Netw., (2016)