From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On exploiting cognitive radio to mitigate interference in macro/femto heterogeneous networks., , , и . IEEE Wirel. Commun., 18 (3): 40-47 (2011)An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds., , , , , , , , и . CoRR, (2020)Traffic-aware Patching for Cyber Security in Mobile IoT., , , и . CoRR, (2017)Analysis of Information Delivery Dynamics in Cognitive Sensor Networks Using Epidemic Models., , и . IEEE Internet of Things Journal, 5 (4): 2333-2342 (2018)ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures., , , , и . SP (Workshops), стр. 126. IEEE, (2020)Beamforming and Power Allocation in Dynamic TDD Networks Supporting Machine-Type Communication., , , и . ICC, стр. 1-6. IEEE, (2020)Phase Transition Diagram for Underlay Heterogeneous Cognitive Radio Networks., , и . GLOBECOM, стр. 1-6. IEEE, (2010)Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI., и . CPSIOTSEC@CCS, стр. 1-9. ACM, (2023)Key Management for UMTS MBMS., , , и . IEEE Trans. Wirel. Commun., 7 (9): 3619-3628 (2008)Structural Backdoor Attack on IoT Malware Detectors via Graph Explainability., , , и . ICSTW, стр. 400-409. IEEE, (2025)