Author of the publication

Understanding the feasibility of machine learning algorithms in a game theoretic environment for dynamic spectrum access.

, and . SPECTS, page 1-8. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scalable blockchain based trust management in VANET routing protocol., , , , , and . J. Parallel Distributed Comput., (2021)Cybersecurity Information Exchange with Privacy (CYBEX-P) and TAHOE - A Cyberthreat Language., , , , , , , , , and . CoRR, (2021)Vulnerability market as a public-good auction with privacy preservation., and . Comput. Secur., (2020)CarVer: Setting the Standard for Face Verification with Caricatures., , , , and . IJCB, page 1-10. IEEE, (2023)Predicting Congestion Level in Wireless Networks Using an Integrated Approach of Supervised and Unsupervised Learning., , and . UEMCON, page 977-982. IEEE, (2018)Implementation of interface agility for duplex dynamic spectrum access radio using USRP., and . MILCOM, page 762-767. IEEE, (2017)Understanding the feasibility of machine learning algorithms in a game theoretic environment for dynamic spectrum access., and . SPECTS, page 1-8. IEEE, (2017)Attribute based sharing in cybersecurity information exchange framework., , and . SPECTS, page 1-6. IEEE, (2017)Performance Modeling of Multi-Rate HDR and its Effect on TCP Throughput., , and . ICC, page 5206-5211. IEEE, (2007)Synchronous and Asynchronous Auction Models for Dynamic Spectrum Access., and . ICDCN, volume 4308 of Lecture Notes in Computer Science, page 558-569. Springer, (2006)