From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SDR Implementation of WIFI Attacks Using GNURadio., , и . CSA, том 513 из Lecture Notes in Networks and Systems, стр. 299-309. Springer, (2022)Perceptual Masking Model Using Lifting Wavelet Transform for Fingerprint Images., , , и . CSA, том 199 из Lecture Notes in Networks and Systems, стр. 175-184. Springer, (2020)New hardware Cryptosystem based chaos for the secure real-time of embedded applications., , , и . SiPS, стр. 251-254. IEEE, (2011)Embedded hyperchaotic Lorenz generator for secure communications., , , и . NEWCAS, стр. 1-4. IEEE, (2013)A lightweight efficient chaos-based cryptosystem for constrained-node networks., , , и . Int. J. Commun. Syst., (2020)Real time hardware implementation of a new Duffing's chaotic attractor., , , и . ICECS, стр. 559-562. IEEE, (2009)Embedded Genesio-Tesi chaotic generator for ciphering communications., , , , и . CSNDSP, стр. 234-238. IEEE, (2010)Hyperchaos-Based Spreading Codes Generator for DS-CDMA Communication Systems., , и . Journal of Circuits, Systems, and Computers, 27 (13): 1850207:1-1850207:23 (2018)A new image crypto-compression system SPIHT-PSCS., , , и . CoDIT, стр. 706-711. IEEE, (2014)The impact of intentional interference on the performances of ML detector in MIMO systems., , и . Phys. Commun., (2022)