Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chaining for securing data provenance in distributed information networks., , , and . MILCOM, page 1-6. IEEE, (2012)Steering-assist control system on curved road using car-to-car communication., , , , , , and . ITSC, page 1-6. IEEE, (2013)Physical layer challenge-response authentication in wireless networks with relay., , , and . INFOCOM, page 1276-1284. IEEE, (2014)On throughput efficiency of geographic opportunistic routing in multihop wireless networks., , , and . QSHINE, page 41. ACM, (2007)Jamming-Resistant Communication: Channel Surfing without Negotiation., , and . ICC, page 1-6. IEEE, (2010)Intelligence Measure of Cognitive Radios with Learning Capabilities., , , , , and . GLOBECOM, page 1-6. IEEE, (2016)On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks., , , and . Mob. Networks Appl., 12 (5-6): 347-357 (2007)Multi-depth Dilated Network for Fashion Landmark Detection., , , , and . ICME Workshops, page 60-65. IEEE, (2019)Local Adaptive Illumination-Driven Input-Level Fusion for Infrared and Visible Object Detection., , , , , and . Remote. Sens., 15 (3): 660 (February 2023)Location Privacy and Spectrum Efficiency Enhancement in Spectrum Sharing Systems., , , and . IEEE Trans. Cogn. Commun. Netw., 9 (6): 1472-1488 (December 2023)