Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Mode Selection for D2D Communication in Industrial IoT Networks., , , , and . VTC Fall, page 1-6. IEEE, (2020)Secrecy Outage of SWIPT in the Presence of Cooperating Eavesdroppers., and . CoRR, (2019)Secrecy Outage for Wireless Sensor Networks., , and . CoRR, (2019)Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach., , , , and . Mob. Inf. Syst., (2020)Low Latency Ambient Backscatter Communications with Deep Q-Learning for Beyond 5G Applications., , , , and . VTC Spring, page 1-6. IEEE, (2020)Secrecy Analysis of Relay Assisted Device-to-Device Systems under Channel Uncertainty., , , and . FIT, page 345-349. IEEE Computer Society, (2017)Secrecy Analysis and Learning-Based Optimization of Cooperative NOMA SWIPT Systems., , , , and . ICC Workshops, page 1-6. IEEE, (2019)Applications of Backscatter Communications for Healthcare Networks., , , , , and . IEEE Netw., 33 (6): 50-57 (2019)Outage Analysis of Relay-Aided Non-Orthogonal Multiple Access with Partial Relay Selection., , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2018)Backscatter-Enabled Efficient V2X Communication With Non-Orthogonal Multiple Access., , , , and . IEEE Trans. Veh. Technol., 70 (2): 1724-1735 (2021)