Author of the publication

Optimal Power Control for DoS Attack over Fading Channel: A Game-Theoretic Approach.

, , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EAP Extensions for the EAP Re-authentication Protocol (ERP)., , , , and . RFC, (July 2012)Behavior Modeling of the Amplifier Nonlinearity With the AC Josephson Voltage Standard., , , , and . IEEE Trans. Instrumentation and Measurement, 68 (6): 1990-1995 (2019)Soil Organic Carbon Prediction Using Vis-NIR Spectroscopy with a Large Dataset., , and . CCTA (1), volume 545 of IFIP Advances in Information and Communication Technology, page 76-86. Springer, (2017)On Security of a White-Box Implementation of SHARK., and . ISC, volume 9290 of Lecture Notes in Computer Science, page 455-471. Springer, (2015)An effective genetic algorithm for the flexible job-shop scheduling problem., , and . Expert Syst. Appl., 38 (4): 3563-3573 (2011)Indoor localization algorithm based on hybrid annealing particle swarm optimization., and . ICACI, page 330-335. IEEE, (2018)Secure Mobile Agents in Electronic Commerce by Using Undetachable Signatures from Pairings., , , and . ICEB, page 1038-1043. Academic Publishers/World Publishing Corporation, (2004)Robustness Analysis of Asynchronous Sampled-Data Multiagent Networks With Time-Varying Delays., , and . IEEE Trans. Automat. Contr., 63 (7): 2145-2152 (2018)An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices., , , and . ACSAC, page 16-29. ACM, (2016)Variable-Length Quantization Strategy for Hashing., , , , and . ICIP, page 2239-2243. IEEE, (2019)