Author of the publication

Effective Capacity of Delay-Constrained Cognitive Radio Links Exploiting Primary Feedback.

, , , and . IEEE Trans. Vehicular Technology, 65 (9): 7334-7348 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem., , and . IEEE Trans. Cloud Comput., 9 (3): 854-867 (2021)A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning., , , , , and . IEEE Commun. Surv. Tutorials, 23 (4): 2460-2493 (2021)Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory., , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (1): 112-129 (2022)Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey., , , , , and . CoRR, (2021)Effective capacity of delay constrained cognitive radio links exploiting primary feedback., , , and . WiOpt, page 412-419. IEEE, (2013)Interference-based optimal power-efficient access scheme for cognitive radio networks., , , , and . ICNC, page 962-967. IEEE Computer Society, (2015)Effective capacity of cognitive radio links: Accessing primary feedback erroneously., , , and . ISWCS, page 395-400. IEEE, (2014)Toward a Protected Cloud Against Side Channel Attacks: A Game-Theoretic Framework., , and . Allerton, page 78-83. IEEE, (2018)Game theoretic defense approach to wireless networks against stealthy decoy attacks., , and . Allerton, page 816-821. IEEE, (2016)Dynamic game-theoretic defense approach against stealthy Jamming attacks in wireless networks., , and . Allerton, page 252-258. IEEE, (2017)