Author of the publication

Detecting the greedy spectrum occupancy threat in cognitive radio networks.

, , , , , , and . ICC, page 4939-4944. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel lightpath provisioning under wavelength continuity constraint in multi-domain optical networks based on hierarchical path computation element., , , and . Sci. China Inf. Sci., 56 (3): 1-9 (2013)The diameter of mobile ad hoc networks., , , and . Wirel. Commun. Mob. Comput., 16 (15): 2287-2297 (2016)An enhanced backward recursive PCE-based computation scheme for end-to-end disjoint paths in multi-domain networks., , , , , and . Photonic Netw. Commun., 24 (1): 22-28 (2012)Adaptive Backstepping Sliding Mode Control of Coaxial Octorotor Unmanned Aerial Vehicle., , , , , and . IEEE Access, (2019)An energy efficient routing protocol for Wireless Sensor Network., , , , , , and . APCC, page 823-827. IEEE, (2012)Lightpath-based flooding for GMPLS-controlled all-optical networks., , and . IEEE Communications Letters, 11 (1): 91-93 (2007)Research on Mobile Network User Complaint Warning Method Based on Multimodal Data., , , , , , , , and . ICT-DM, page 1-6. IEEE, (2023)Model Free iterative learning for table motion control of lithography machine., , , and . ICISE, page 47-50. IEEE, (2023)Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line Model., , , , , and . ICAIS (3), volume 11634 of Lecture Notes in Computer Science, page 586-595. Springer, (2019)Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server., , , , , and . ICAIS (3), volume 11634 of Lecture Notes in Computer Science, page 3-12. Springer, (2019)