Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliable data fusion in wireless sensor networks under Byzantine attacks., , and . MILCOM, page 810-815. IEEE, (2011)Jamming-resilient subcarrier assignment for OFDMA based space-time coded systems., , , and . EIT, page 260-265. IEEE, (2009)On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks., , and . CISS, page 1-6. IEEE, (2010)Architecture design of mobile access coordinated wireless sensor networks., , , and . ICC, page 1720-1724. IEEE, (2013)Performance of QO-STBC-OFDM in partial-band noise jamming., , and . CISS, page 1-6. IEEE, (2010)Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks., , , and . IEEE Trans. Parallel Distributed Syst., 25 (4): 950-959 (2014)Secure Collision-Free Frequency Hopping for OFDMA-Based Wireless Networks., , , and . EURASIP J. Adv. Signal Process., (2009)Joint design of cooperative protocols and distributed beamforming for multi-hop cognitive radio networks., , , , , , and . Int. J. Netw. Comput., 9 (1): 53-69 (2019)Channel characterization and throughput tradeoff for wireless sensor networks., and . MILCOM, page 1-5. IEEE, (2012)Joint Cooperative Protocols and Distributed Beamforming Design with Efficient Secondary User Selection for Multi-hop Cognitive Radio Networks., , , , , , and . IPDPS Workshops, page 837-844. IEEE Computer Society, (2018)