Author of the publication

QoE loss probability based game-theoretic approach for spectrum sharing in heterogeneous networks.

, , , , , , and . ICC, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms., , , , and . Inf. Sci., (2017)FedTruth: Byzantine-Robust and Backdoor-Resilient Federated Learning Framework., and . CoRR, (2023)Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing., , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (1): 117-130 (2021)Secure and Efficient Task Matching with Multi-keyword in Multi-requester and Multi-worker Crowdsourcing., and . IWQoS, page 1-6. IEEE, (2021)Stable Neighbor Based Adaptive Replica Allocation in Mobile Ad Hoc Networks., , , and . International Conference on Computational Science, volume 3036 of Lecture Notes in Computer Science, page 373-380. Springer, (2004)EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based on Encrypted Identity Vector., , , , , and . IEEE Internet Things J., 11 (9): 15229-15240 (May 2024)QoE loss probability based game-theoretic approach for spectrum sharing in heterogeneous networks., , , , , , and . ICC, page 1-6. IEEE, (2017)Identity-preserving public auditing for shared cloud data., , , and . IWQoS, page 159-164. IEEE, (2015)Multi-message Authentication over Noisy Channel with Secure Channel Codes., , , , , , and . CoRR, (2017)Attribute-based fine-grained access control with efficient revocation in cloud storage systems., , and . AsiaCCS, page 523-528. ACM, (2013)