Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Denoising signals in cognitive radio systems using an evolutionary algorithm based adaptive filter., , and . UEMCON, page 1-6. IEEE, (2016)Metrics for Evaluating the Efficiency of Compressing Sensing Techniques., , and . CoRR, (2020)Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey., and . Phys. Commun., (2020)Jamming and Lost Link Detection in Wireless Networks with Fuzzy Logic, and . International Journal of Scientific & Engineering Research, (February 2013)Asymmetry analysis based on genetic algorithms for the prediction of foot ulcers., , , , and . VDA, volume 7243 of SPIE Proceedings, page 724304. SPIE, (2009)Cyber-security in smart grid: Survey and challenges., , , and . Comput. Electr. Eng., (2018)A Real-time Machine Learning-based GPS Spoofing Solution for Location-dependent UAV Applications., , , , , and . eIT, page 289-293. IEEE, (2023)ADS-B Message Injection Attack on UAVs: Assessment of SVM-based Detection Techniques., , , , and . EIT, page 405-410. IEEE, (2022)Noise cancellation in cognitive radio systems: A performance comparison of evolutionary algorithms., , and . CCWC, page 1-7. IEEE, (2017)Secure spatial trajectory prediction based on traffic flows., , and . EIT, page 723-727. IEEE, (2016)