From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Physical Layer Key Generation in 5G Wireless Networks., , , , , и . CoRR, (2019)Optimal Online Learning with Randomized Feedback Graphs with Application in PUE Attacks in CRN., , , , и . CoRR, (2017)Machine Learning-Based Delay-Aware UAV Detection Over Encrypted Wi-Fi Traffic., , , , , и . CNS, стр. 1-7. IEEE, (2019)Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead., , , , , и . IEEE Netw., 34 (6): 198-204 (2020)Intelligence Measure of Cognitive Radios with Learning Capabilities., , , , , и . GLOBECOM, стр. 1-6. IEEE, (2016)String Stability Analysis of Cooperative Adaptive Cruise Control under Jamming Attacks., , , и . HASE, стр. 157-162. IEEE Computer Society, (2017)Multi-stage Deep Classifier Cascades for Open World Recognition., , , , , , и . CIKM, стр. 179-188. ACM, (2019)Online learning-based optimal primary user emulation attacks in cognitive radio networks., , , и . CNS, стр. 100-108. IEEE, (2016)Pilot Contamination Attack Detection for NOMA in 5G mm-Wave Massive MIMO Networks., , , , и . IEEE Trans. Inf. Forensics Secur., (2020)Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs., , , и . SECRYPT, стр. 536-543. SCITEPRESS, (2024)