Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Channel-based spoofing detection in frequency-selective rayleigh channels., , , and . IEEE Trans. Wirel. Commun., 8 (12): 5948-5956 (2009)Bandwidth Sharing for Relaying in Cellular Systems., , , and . IEEE Trans. Wirel. Commun., 11 (1): 117-129 (2012)Bandwidth Exchange for enabling forwarding in wireless access networks., , and . PIMRC, page 2628-2632. IEEE, (2009)Coalitional Games in Gaussian Interference Channels., , and . ISIT, page 2210-2214. IEEE, (2006)Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Cross-Layer Design Approach., , and . ICC, page 3511-3516. IEEE, (2006)Impact of end-user decisions on pricing in wireless networks., and . CISS, page 1-6. IEEE, (2014)Evolutionary game theoretic analysis of distributed denial of service attacks in a wireless network., , , and . CISS, page 36-41. IEEE, (2016)ProxiMate: proximity-based secure pairing using ambient wireless signals., , , , and . MobiSys, page 211-224. ACM, (2011)Do not share!: invisible light beacons for signaling preferences to privacy-respecting cameras., , , , , and . VLCS@MobiCom, page 39-44. ACM, (2014)High-rate flicker-free screen-camera communication with spatially adaptive embedding., , , , , , , and . INFOCOM, page 1-9. IEEE, (2016)