Author of the publication

Counteracting malicious users in cognitive radio networks over imperfect reporting channels.

, , , , and . WCSP, page 1-6. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Analysis of Efficient Algorithm for Counting and Enumerating Cycles in LDPC Codes., , , and . ITITS (1), volume 454 of Advances in Intelligent Systems and Computing, page 131-137. (2015)Controller and Gateway Partition Placement in SDN-Enabled Integrated Satellite-Terrestrial Network., , and . ICC Workshops, page 1-6. IEEE, (2019)Outage Analysis and Optimization of NOMA-based Integrated Satellite-Terrestrial System with an AF Relay., , , and . ICCC, page 741-746. IEEE, (2019)Joint design for AN-aided transmission and power splitting in secrecy MIMO SWIPT channel using alternating optimization., , , and . ICSPCC, page 1-4. IEEE, (2017)Joint Robust Design for Secure AF Relay Networks With SWIPT., , , and . IEEE Access, (2017)Finite Blocklength Covert Communications: When the Warden Wants to Detect the Communications Quickly., , , , and . IEEE Trans. Veh. Technol., 71 (10): 11278-11283 (2022)Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming., , , , , and . Sensors, 16 (11): 1908 (2016)Partitioned Controller Placement in SDWANs for Reliability Maximization with Latency Constraints., , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2019)Secrecy outage analysis of scan-and-wait combining scheme in multi-antenna downlink wiretap networks., , , , , and . ICCS, page 1-5. IEEE, (2016)Compressive Sampling for Recognition of Frequency-Hopping Spread Spectrum Signals., , and . WCSP, page 691-696. IEEE, (2020)