Author of the publication

Vulnerabilities of Physical Layer Secret Key Generation Against Environment Reconstruction Based Attacks.

, , , , , , and . IEEE Wirel. Commun. Lett., 9 (5): 693-697 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Yolov5s-MSD: a multi-scale ship detector for visible video image., , , and . Multim. Syst., 30 (1): 3 (February 2024)Tuple Measure Model Based on CFI-Apriori Algorithm., , and . ICAIS (1), volume 12239 of Lecture Notes in Computer Science, page 49-61. Springer, (2020)Performance Investigation of Uniaxially Tensile Stressed Ge n-FinFETs Formed on Biaxially Strained GeOI Substrates And Its Impact On Ge CMOS Inverters., , , , , , and . ASICON, page 1-4. IEEE, (2019)Architecture of Real-Time and Dynamic Audit for Network Behavior Security., and . ICNC-FSKD, volume 1074 of Advances in Intelligent Systems and Computing, page 539-546. Springer, (2019)Dynamic Scheduling of Multi-Type Battery Charging Stations for EV Battery Swapping., , , , , and . SmartGridComm, page 1-6. IEEE, (2019)Exact wave solutions for a (3+1)-dimensional generalized B-type Kadomtsev-Petviashvili equation., , and . Comput. Math. Appl., 77 (12): 3087-3101 (2019)M-lump solutions to a (3+1)-dimensional nonlinear evolution equation., , and . Comput. Math. Appl., 76 (3): 592-601 (2018)Disjunctive logic programs with existential quantification in rule heads., , and . Theory Pract. Log. Program., 13 (4-5): 563-578 (2013)Handoff counting in hierarchical cellular system with overflow scheme., and . Comput. Networks, 46 (4): 541-554 (2004)Brain Tissue Segmentation based on Graph Convolutional Networks., , , , and . ICIP, page 1470-1474. IEEE, (2019)