Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimum Tag Reading Efficiency of Multi-Packet Reception Capable RFID Readers., , and . CoRR, (2013)An efficient image-based verification scheme by fusion of double random phase encoding and dynamic chaotic map., , , and . Multimedia Tools Appl., 78 (17): 25001-25018 (2019)Characterizing hidden nodes with experimental evaluation in noisy MANETs., , , and . ICC, page 1763-1768. IEEE, (2013)Performance characterization of CSMA/CA adapted multi-user MIMO aware MAC in WLANs., , and . EURASIP J. Wireless Comm. and Networking, (2011)Survey on MAC protocols in Underwater Acoustic Sensor Networks., and . ISCIT, page 80-84. IEEE, (2014)Precise-Optimal Frame Length Based Collision Reduction Schemes for Frame Slotted Aloha RFID Systems., and . KSII Trans. Internet Inf. Syst., 8 (1): 165-182 (2014)Deep Learning in Physical Layer: Review on Data Driven End-to-End Communication Systems and their Enabling Semantic Applications., and . CoRR, (2024)Comprehensive Performance Analysis of Privacy Protection Protocols Utilizing Fake Packet Injection Techniques., and . IEEE Access, (2020)Evaluation of Neural Demappers for Trainable Constellation in an End-to-End Communication System., and . ICUFN, page 39-42. IEEE, (2023)Privacy-Preserving Surveillance for Smart Cities., , , and . ICUFN, page 301-306. IEEE, (2022)