Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the performance of chaos shift keying in MIMO communications systems., , and . WCNC, page 1432-1437. IEEE, (2011)On Physical Layer Security Over Fox's H-Function Wiretap Fading Channels., , and . IEEE Trans. Vehicular Technology, 68 (7): 6608-6621 (2019)Performance analysis of peer-to-peer V2V wireless communications in the presence of interference., , , and . PIMRC, page 1-6. IEEE, (2017)Implementation of a Differential Chaos Shift Keying communication system in GNU radio., , , , and . ISWCS, page 934-938. IEEE, (2012)An Efficient Blockchain-Based Hierarchical Authentication Mechanism for Energy Trading in V2G Environment., , , , and . ICC Workshops, page 1-6. IEEE, (2019)Securing Fog-to-Things Environment Using Intrusion Detection System Based On Ensemble Learning., , , , and . WCNC, page 1-7. IEEE, (2019)Performance analysis of STBC-CSK communication system over slow fading channel., and . Signal Process., 93 (7): 2055-2060 (2013)Intelligent Virtual Resource Allocation of QoS-Guaranteed Slices in B5G-Enabled VANETs for Intelligent Transportation Systems., , , , and . IEEE Trans. Intell. Transp. Syst., 23 (10): 19704-19713 (2022)Softwarized Resource Management and Allocation With Autonomous Awareness for 6G-Enabled Cooperative Intelligent Transportation Systems., , , , and . IEEE Trans. Intell. Transp. Syst., 23 (12): 24662-24671 (2022)Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations., , , , and . IEEE Commun. Surv. Tutorials, 21 (3): 2702-2733 (2019)