Author of the publication

Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment.

, , , and . TrustCom/ISPA/IUCC, page 1656-1661. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-Efficient Resource Allocation for Wireless Powered Cognitive Mobile Edge Computing., , , , and . ICC Workshops, page 1-6. IEEE, (2019)Blind Spectrum Sensing Based on Unilateral Goodness of Fit Testing for Multi-antenna Cognitive Radio System., and . ChinaCom (1), volume 209 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 472-479. Springer, (2016)Multiantenna Based Blind Spectrum Sensing via Nonparametric Test., , and . ChinaCom (2), volume 210 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 165-174. Springer, (2016)Impartial Cooperation in SWIPT-Assisted NOMA Systems With Random User Distribution., , , , , and . IEEE Trans. Veh. Technol., 72 (8): 10488-10504 (August 2023)System Outage Probability of PS-SWIPT Enabled Two-Way AF Relaying With Hardware Impairments., , , and . IEEE Trans. Veh. Technol., 69 (11): 13532-13545 (2020)Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing., , , and . Sci. China Inf. Sci., 60 (5): 59101 (2017)Behave Well: How to Win a Pop Vacant Band via Cooperative Spectrum Sensing., , and . KSII Trans. Internet Inf. Syst., 9 (4): 1321-1336 (2015)Drone-Assisted and Blockchain-Enabled Edge-Cloud Computing Networks: Architecture Design, Case Study, and Future Directions., , , , , and . IEEE Internet Things Mag., 4 (4): 54-59 (2021)Impact of Hardware Impairments on Covert Cooperative Backscatter Communications., , , , and . GLOBECOM, page 1078-1083. IEEE, (2023)Secrecy Communications for Wireless-Powered Full-Duplex Cooperative NOMA Systems: A User Selection and Friendly Jamming Approach., , , and . ICCC Workshops, page 1-6. IEEE, (2023)