Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A dynamic colonel blotto game model for spectrum sharing in wireless networks., and . Allerton, page 287-294. IEEE, (2017)Bandwidth Sharing for Relaying in Cellular Systems., , , and . IEEE Trans. Wirel. Commun., 11 (1): 117-129 (2012)Channel-based spoofing detection in frequency-selective rayleigh channels., , , and . IEEE Trans. Wirel. Commun., 8 (12): 5948-5956 (2009)Learning End-User Behavior for Optimized Bidding and User/Network Association., and . IEEE Trans. Cogn. Commun. Netw., 7 (3): 845-855 (2021)Evolutionary game theoretic analysis of distributed denial of service attacks in a wireless network., , , and . CISS, page 36-41. IEEE, (2016)ProxiMate: proximity-based secure pairing using ambient wireless signals., , , , and . MobiSys, page 211-224. ACM, (2011)Do not share!: invisible light beacons for signaling preferences to privacy-respecting cameras., , , , , and . VLCS@MobiCom, page 39-44. ACM, (2014)Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems., , , and . ITSC, page 307-312. IEEE, (2018)On the sum-capacity of degraded Gaussian multiple-access relay channels., , and . IEEE Trans. Inf. Theory, 55 (12): 5394-5411 (2009)Coalitional Games in Receiver Cooperation for Spectrum Sharing., , and . CISS, page 949-954. IEEE, (2006)