Author of the publication

Secure detection in wireless sensor networks using a simple encryption method.

, and . WCNC, page 114-119. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the capacity of constrained connectivity Hopfield neural networks., , and . Neural Parallel & Scientific Comp., 2 (1): 115-129 (1994)Call admission control for CDMA cellular networks supporting multimedia services., and . WCNC, page 997-1002. IEEE, (2006)Path restoration with QoS and label constraints in MPLS networks., and . ICC, page 1278-1282. IEEE, (2004)Noncoherent SIMO detection by expectation propagation., and . ICC, page 1-6. IEEE, (2017)A low complexity cryptosystem based on nonsystematic turbo codes., and . ICC, page 7388-7393. IEEE, (2015)Maximum likelihood receiver for multiband keying signals in AWGN channel UWB., and . GLOBECOM, page 3522-3525. IEEE, (2004)Performance analysis of spectrum monitoring for cognitive radios., , and . MILCOM, page 1-6. IEEE, (2012)Fast Detection of Malicious Behavior in Cooperative Spectrum Sensing., and . IEEE J. Sel. Areas Commun., 32 (3): 377-386 (2014)Nonparametric Density Estimation, Hypotheses Testing, and Sensor Classification in Centralized Detection., and . IEEE Trans. Inf. Forensics Secur., 9 (3): 426-435 (2014)Blind Channel Estimation and Symbol Detection for Multi-Cell Massive MIMO Systems by Expectation Propagation., and . IEEE Trans. Wirel. Commun., 17 (2): 943-954 (2018)