Author of the publication

Counteracting malicious users in cognitive radio networks over imperfect reporting channels.

, , , , and . WCSP, page 1-6. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outage Constrained Robust Beamforming and Power Splitting for Secure MISO SWIPT Channel., , and . IEEE Wirel. Commun. Lett., 6 (6): 826-829 (2017)Performance Analysis of Two-Way Multi-Antenna Multi-Relay Networks With Hardware Impairments., , and . IEEE Access, (2017)Increasing physical layer security through reliability-based HARQ., , , and . WCSP, page 1-5. IEEE, (2016)Counteracting malicious users in cognitive radio networks over imperfect reporting channels., , , , and . WCSP, page 1-6. IEEE, (2014)Secure Communication Based on a Modified RB-HARQ Protocol., , , and . iThings/GreenCom/CPSCom/SmartData, page 287-292. IEEE, (2016)A Potential Game Approach to Multiple UAVs 3D Placement in Iot Communication Networks., , , , , and . WCSP, page 660-665. IEEE, (2020)Performance analysis of a dual-hop satellite relay network with hardware impairments., , , , and . WOCC, page 1-5. IEEE, (2016)Secrecy outage analysis of cooperative relay system with multiuser scheduling., , , , and . ISCIT, page 38-43. IEEE, (2016)PPFO: A Privacy Preservation-oriented Data Freshness Optimization Framework For Mobile Crowdsensing., , , , , and . IEEE Commun. Stand. Mag., 7 (4): 34-40 (December 2023)Joint Robust Design for Secure AF Relay Networks With SWIPT., , , and . IEEE Access, (2017)