Author of the publication

Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications.

, , , , and . IEEE Trans. Inf. Forensics Secur., 12 (11): 2807-2822 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Origin of Chemoselectivity of Halohydrin Dehalogenase-Catalyzed Epoxide Ring-Opening Reactions., , and . J. Chem. Inf. Model., 64 (11): 4530-4541 (2024)R Type of Strong Connectivity in LL-fuzzy Topological Spaces.. ICFIE, volume 62 of Advances in Intelligent and Soft Computing, page 1433-1439. (2009)Deep Reinforcement Learning Based Service Migration Strategy for Edge Computing., , , , , and . SOSE, IEEE, (2019)Ensemble MultiBoost Based on RIPPER Classifier for Prediction of Imbalanced Software Defect Data., , , , , , and . IEEE Access, (2019)Research on the Influence of New Technology on Radiotelephony Communication in the Cockpit., , , and . HCI (33), volume 1032 of Communications in Computer and Information Science, page 433-441. Springer, (2019)Constraint tightening for the probabilistic collision avoidance of multi-vehicle groups in uncertain traffic., and . CCTA, page 2188-2195. IEEE, (2017)A Method to Produce Minimal Real Time Geometric Representations of Moving Obstacles., , , , , and . IntelliSys (1), volume 868 of Advances in Intelligent Systems and Computing, page 881-892. Springer, (2018)Brain-Cloud: A Generalized and Flexible Registration Framework for Brain MR Images., , , and . AE-CAI, volume 8090 of Lecture Notes in Computer Science, page 153-161. Springer, (2013)Dynamic Heuristics for Time and Cost Reduction in Grid Workflows., , and . CSCWD (Selected Papers), volume 4402 of Lecture Notes in Computer Science, page 499-508. Springer, (2006)Accelerating Lattice Boltzmann Method by Fully Exposing Vectorizable Loops., , , , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 107-121. Springer, (2019)