Author of the publication

Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks.

, , and . IAS, page 155-160. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting., , , , and . IWDW, volume 6526 of Lecture Notes in Computer Science, page 211-223. Springer, (2010)Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks., , and . IAS, page 155-160. IEEE, (2010)An Opportunistic Scheduling Algorithm for MPEG Video Over Shared Wireless Downlink., , and . ICC, page 872-877. IEEE, (2006)Power allocation over two identical Gilbert-Elliott channels., , and . ICC, page 5888-5892. IEEE, (2013)A neighborhood vector propagation algorithm for community detection., , and . GLOBECOM, page 2923-2928. IEEE, (2014)Deep Reinforcement Learning for Intelligent Computing and Content Edge Service in ICN-based IoV., , , and . ICC Workshops, page 1-7. IEEE, (2021)A Dynamic Scheme For Authenticated Group Key Agreement Protocol., , , and . TeNe, page 245-250. Springer, (2008)KCC Method: Unknown Intrusion Detection Based on Open Set Recognition., , , and . ICTAI, page 1343-1347. IEEE, (2021)Channel aware resource allocation for device-to-device communication underlaying cellular networks., , , , and . SSIC, page 1-5. IEEE, (2016)Multi-Agent Learning Automata for Online Adaptive Control of Large-Scale Traffic Signal Systems., , , and . GLOBECOM, page 1497-1502. IEEE, (2022)