Author of the publication

A Survey on AI-Enabled Attacks and AI-Empowered Countermeasures in Physical Layer.

, , , , , and . WF-IoT, page 1-7. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Throughput of Multipath Data Transmission over Multihop Ad Hoc Networks., and . Wireless and Optical Communications, IASTED/ACTA Press, (2006)Exploring Online Identity Re-Construction in Social Network Communities: a Qualitative Study., , and . PACIS, page 36. (2014)Localization and Mass Spectra of Fermions on Symmetric and Asymmetric Thick Branes, , , and . Phys. Rev. D, (2009)Fermions in Self-dual Vortex Background on a String-like Defect, , , and . Nucl. Phys. B, (2007)Fermions in gravity and gauge backgrounds on a brane world, , and . Mod. Phys. Lett. A, (2008)Dynamic spectrum sharing and user scheduling for CR-MIMO system based on interference alignment., , and . ICT, page 1-5. IEEE, (2013)Image Retrieval Based on Multidimensional Feature Properties., , and . Storage and Retrieval for Image and Video Databases (SPIE), volume 2420 of SPIE Proceedings, page 47-57. SPIE, (1995)Successful Community Municipal Portal Diffusion: Internal Government Factors and Individual Perceptions., , , and . AMCIS, page 531. Association for Information Systems, (2009)Field Similarity Algorithm., , , , and . JCIS, page 432-436. JCIS / Association for Intelligent Machinery, Inc., (2002)Blind Collision Resolution Using Cooperative Transmission., , , , and . VTC Spring, page 1-5. IEEE, (2010)