Author of the publication

Security enhanced via dynamic fountain code design for wireless delivery.

, , , , and . WCNC, page 1-6. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Subcarrier and Power Allocation Considering Fairness in OFDM-Based Cognitive Radio Systems., , and . WICON, volume 98 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 45-57. Springer, (2011)Cooperative Routing and Transmission over Multi-hop Network of RFID Tags., , and . VTC Fall, page 1-5. IEEE, (2021)FWSResNet: An Edge Device Fingerprinting Framework Based on Scattering and Convolutional Networks., , , and . VTC Spring, page 1-6. IEEE, (2022)Security and Reliability Performance Analysis for URLLC With Randomly Distributed Eavesdroppers., , , and . ICC Workshops, page 1-6. IEEE, (2021)Deep RF Device Fingerprinting by Semi-Supervised Learning with Meta Pseudo Time-Frequency Labels., , and . WCNC, page 2369-2374. IEEE, (2022)Adaptive Noise Aggregation Based Secure Image Transmission over Wireless Fading Channels., , and . WCNC, page 37-42. IEEE, (2022)A Novel Algorithm to Control Contents Selectively for Vehicular Communication Networks., , , , and . VTC Fall, page 1-2. IEEE, (2010)Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System., , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 634-643. Springer, (2015)Estimation Based Adaptive ACB Scheme for M2M Communications., , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 165-174. Springer, (2015)Adaptive analog network coding strategy with variable slot numbers in two-way relay systems., , and . ICCS, page 409-413. IEEE, (2014)