Author of the publication

Security enhancement in cooperative jamming using compromised secrecy region minimization.

, , and . CWIT, page 214-218. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intercept Probability Analysis of, , and . CoRR, (2013)Recursive Principal Component Analysis-Based Data Outlier Detection and Sensor Data Aggregation in IoT Systems., , and . IEEE Internet of Things Journal, 4 (6): 2207-2216 (2017)A Split-Reduced Successive Cancellation List Decoder for Polar Codes., , , , and . CoRR, (2015)Pilot Contamination for Wideband Massive MMO: Number of cells Vs Multipath., , , and . CoRR, (2017)Signature Design of Sparsely Spread CDMA Based on Superposed Constellation Distance Analysis., , and . CoRR, (2016)Security versus Reliability Analysis of Opportunistic Relaying., , , and . CoRR, (2013)Futures-Based Resource Trading and Fair Pricing in Real-Time IoT Networks., , , , and . IEEE Wirel. Commun. Lett., 9 (1): 125-128 (2020)Accuracy of Harmonic Mean Approximation in Performance Analysis of Multihop Amplify-and-Forward Relaying., and . IEEE Wirel. Commun. Lett., 3 (2): 125-128 (2014)Adaptive Channel Prediction, Beamforming and Scheduling Design for 5G V2I Network: Analytical and Machine Learning Approaches., , and . IEEE Trans. Vehicular Technology, 69 (5): 5055-5067 (2020)Capturing the Sparsity and Tracking the Channels for Massive MIMO Networks., , , , and . IEEE Trans. Veh. Technol., 69 (1): 685-699 (2020)