Author of the publication

Jamming-Resilient Message Dissemination in Wireless Networks.

, , , , , and . IEEE Trans. Mob. Comput., 22 (3): 1536-1550 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theme issue on advances in the Internet of Things: identification, information, and knowledge., , , and . Pers. Ubiquitous Comput., 19 (7): 985-987 (2015)Dynamic spectrum access: from cognitive radio to network radio., , , and . IEEE Wirel. Commun., 19 (1): 23-29 (2012)Enabling smartphone-based HD video chats by cooperative transmissions in CRNs., , , , , and . EURASIP J. Wirel. Commun. Netw., (2015)Cross-Channel: Scalable Off-Chain Channels Supporting Fair and Atomic Cross-Chain Operations., , , , , and . IEEE Trans. Computers, 72 (11): 3231-3244 (November 2023)CloudChain: A Cloud Blockchain Using Shared Memory Consensus and RDMA., , , , , and . IEEE Trans. Computers, 71 (12): 3242-3253 (2022)Robust Compressive Data Gathering in Wireless Sensor Networks., , , , and . IEEE Trans. Wirel. Commun., 12 (6): 2754-2761 (2013)On Protecting the Data Privacy of Large Language Models (LLMs): A Survey., , , , , , and . CoRR, (2024)DCAP: Deep Cross Attentional Product Network for User Response Prediction., , , , , and . CIKM, page 221-230. ACM, (2021)Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs., , , and . WASA, volume 6221 of Lecture Notes in Computer Science, page 36-46. Springer, (2010)Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments., , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 554-563. Springer, (2014)