Author of the publication

Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints.

, , , , , , and . IEEE Access, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of Secondary User Communication on Security Communication of Primary User., , and . CoRR, (2014)Leveraging advanced technologies and operation excellence to build the world's first Knowledge as a Service (KaaS) platform.. SoICT, page 7. ACM, (2017)Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers., , , , and . Mob. Networks Appl., 25 (1): 193-210 (2020)A Framework for Packet Delay Analysis of Point-to-Multipoint Underlay Cognitive Radio Networks., , , and . IEEE Trans. Mob. Comput., 16 (9): 2408-2421 (2017)On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA., , , , , , and . IEEE Access, (2019)On Communication Performance in Energy Harvesting WSNs Under a Cooperative Jamming Attack., , , , , and . IEEE Syst. J., 14 (4): 4955-4966 (2020)Enhanced Intrusion Detection System for an EH IoT Architecture Using a Cooperative UAV Relay and Friendly UAV Jammer., , and . IEEE CAA J. Autom. Sinica, 8 (11): 1786-1799 (2021)A 7nm 4-Core AI Chip with 25.6TFLOPS Hybrid FP8 Training, 102.4TOPS INT4 Inference and Workload-Aware Throttling., , , , , , , , , and 34 other author(s). ISSCC, page 144-146. IEEE, (2021)Outage probability and ergodic capacity of underlay cognitive radio systems with adaptive power transmission., , and . IWCMC, page 785-790. IEEE, (2013)On non-zero secrecy capacity and outage probability of cognitive radio networks., , , and . WPMC, page 1-6. IEEE, (2013)