Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secrecy Outage for Wireless Sensor Networks., , and . CoRR, (2019)Secrecy Outage of SWIPT in the Presence of Cooperating Eavesdroppers., and . CoRR, (2019)Efficient Mode Selection for D2D Communication in Industrial IoT Networks., , , , and . VTC Fall, page 1-6. IEEE, (2020)Secrecy Analysis and Learning-Based Optimization of Cooperative NOMA SWIPT Systems., , , , and . ICC Workshops, page 1-6. IEEE, (2019)Secrecy Analysis of Relay Assisted Device-to-Device Systems under Channel Uncertainty., , , and . FIT, page 345-349. IEEE Computer Society, (2017)Low Latency Ambient Backscatter Communications with Deep Q-Learning for Beyond 5G Applications., , , , and . VTC Spring, page 1-6. IEEE, (2020)Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach., , , , and . Mob. Inf. Syst., (2020)Outage Analysis of Relay-Aided Non-Orthogonal Multiple Access with Partial Relay Selection., , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2018)Applications of Backscatter Communications for Healthcare Networks., , , , , and . IEEE Netw., 33 (6): 50-57 (2019)Backscatter-Enabled Efficient V2X Communication With Non-Orthogonal Multiple Access., , , , and . IEEE Trans. Veh. Technol., 70 (2): 1724-1735 (2021)