From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Collisions for secrecy in cooperative cognitive radio networks with time-varying connectivity., и . GLOBECOM Workshops, стр. 1332-1336. IEEE, (2014)Multiple access game with a cognitive jammer., и . ACSCC, стр. 1383-1387. IEEE, (2012)Predicting Different Health and Lifestyle Behaviors of Social Media Users., , , и . RCAI, том 12948 из Lecture Notes in Computer Science, стр. 57-66. Springer, (2021)Stalling Live Migrations on the Cloud., , , , , и . WOOT, USENIX Association, (2017)On the delay limited secrecy capacity of fading channels., , , и . ISIT, стр. 2617-2621. IEEE, (2009)From Generalist to Specialist: Exploring CWE-Specific Vulnerability Detection., , , и . CoRR, (2024)Optimal scheduling in cooperate-to-join Cognitive Radio Networks., , , и . INFOCOM, стр. 3002-3010. IEEE, (2011)Secrecy in cognitive radio networks: Turning foes to allies., и . WiOpt, стр. 194-200. IEEE, (2013)Jaal: Towards Network Intrusion Detection at ISP Scale., , , , , , , , и . CoNEXT, стр. 134-146. ACM, (2017)NEST: Efficient Transport of Data Summaries over Named Data Networks., , , , и . Networking, стр. 280-288. IFIP, (2018)