Author of the publication

Secrecy Energy Efficiency Optimization for Cooperative Jamming in Cognitive Radio Networks.

, , , , and . ICNC, page 795-799. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Throughput maximization for energy harvesting cognitive radio networks with finite horizon., , , and . WCSP, page 1-7. IEEE, (2017)An optimal multiple stopping rule-based cooperative downloading scheme in vehicular cyber-physical systems., , , , and . IJDSN, (2017)Decomposable Atomic Norm Minimization Channel Estimation for Millimeter Wave MIMO-OFDM Systems., , , , and . WASA, volume 11604 of Lecture Notes in Computer Science, page 3-15. Springer, (2019)Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach., , , , , and . PAC, page 125-126. IEEE, (2018)A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers., , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 854-859. Springer, (2017)A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs., , , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 232-242. Springer, (2015)Optimization Approach of Sintering Feature Parameter Based on Fuzzy SVM., , , and . ISIP, page 412-416. IEEE Computer Society, (2008)Secrecy Energy Efficiency Optimization for Cooperative Jamming in Cognitive Radio Networks., , , , and . ICNC, page 795-799. IEEE Computer Society, (2018)In-situ Detection of Micro Crystals During Cooling Crystallization Based on Deep Image Super-Resolution Reconstruction., and . IEEE Access, (2021)An Adaptive Beaconing Scheme Based on Traffic Environment Parameters Prediction in VANETs., , , , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 524-535. Springer, (2016)