Author of the publication

Why Do We Need to Learn about Citational Practices? Recognizing Knowledge Production from the Global Souths and Beyond.

, , , , , , , , , and . XRDS, 29 (3): 12-17 (Spring 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Green Prospective of Non-orthogonal Multiple Access (NOMA) for 5G., , , , , and . Information, 11 (2): 89 (2020)Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM., , , , and . IEEE Commun. Mag., 56 (5): 22-31 (2018)Sustainable and Round-Optimized Group Authenticated Key Exchange in Vehicle Communication., , , and . IEEE Trans. Intell. Transp. Syst., 24 (12): 15400-15413 (December 2023)From Digital Twin to Metaverse: The Role of 6G Ultra-Reliable and Low-Latency Communications with Multi-Tier Computing., , , , , and . IEEE Wirel. Commun., 30 (3): 140-146 (June 2023)Multiuser Massive MIMO-OFDM System Incorporated with Diverse Transformation for 5G Applications., , and . Wirel. Pers. Commun., 109 (4): 2741-2756 (2019)Systematic literature review on predictive maintenance of vehicles and diagnosis of vehicle's health using machine learning techniques., , , and . Comput. Intell., 38 (6): 1990-2008 (December 2022)Digital Twin Empowered Ultra-Reliable and Low-Latency Communications-based Edge Networks in Industrial IoT Environment., , , , and . ICC, page 5651-5656. IEEE, (2022)Quantum Computing Threat Modelling on a Generic CPS Setup., , , and . ACNS Workshops, volume 12809 of Lecture Notes in Computer Science, page 171-190. Springer, (2021)Evaluating Blockchain Protocols with Abusive Modeling., , and . AsiaCCS, page 109-122. ACM, (2022)Analysis of Quantum Key Distribution Based Satellite Communication., and . ICCCNT, page 1-5. IEEE, (2018)