Author of the publication

Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User.

, , , , , , , and . ICSPCC, page 1-5. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Water between Plates in the Presence of an Electric Field in an Open System, , and . J. Phys. Chem. B, (2005)Porting or Not Porting? Availability of Exclusive Games in the Mobile App Market., , and . PACIS, page 247. (2017)Smart switch: Optimize for green cellular networks., , , and . CCNC, page 701-704. IEEE, (2013)Novasky: Cinematic-quality VoD in a P2P storage cloud., , , , , and . INFOCOM, page 936-944. IEEE, (2011)Adaptive Sampling for GPU-based 3-D Volume Rendering., , and . ISICDM, page 27-31. ACM, (2018)Delay-oriented power-aware routing in wireless ad hoc networks., , , and . Trans. Emerg. Telecommun. Technol., 26 (3): 334-339 (2015)AMACS: Automated Mobile Application Content Sensing., , , and . IEEE Trans. Comput. Social Systems, 7 (1): 275-284 (2020)Joint Optimization on Trajectory, Altitude, Velocity, and Link Scheduling for Minimum Mission Time in UAV-Aided Data Collection., , , , , , and . IEEE Internet of Things Journal, 7 (2): 1464-1475 (2020)Predicting Channel Quality Indicators for 5G Downlink Scheduling in a Deep Learning Approach., , , , and . CoRR, (2020)Effective Video Multicast over Wireless Internet: Rate Allocation and End-System Based Adaptation., , , , and . IEICE Trans. Commun., 88-B (4): 1395-1402 (2005)