Author of the publication

Achieving Secure Communication in CRN with Malicious Energy Harvester Using Game Theory.

, , , and . GLOBECOM, page 1-7. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning assisted Chimera and Solitary states in Networks., , , , and . CoRR, (2020)Exemplar-Free Continual Transformer with Convolutions., , , , , and . ICCV, page 5874-5884. IEEE, (2023)International Workshop on Legal Data Analytics and Mining (LeDAM 2018): Preface to the Proceedings., , , , , , and . CIKM Workshops, volume 2482 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Deep Twitter diving: exploring topical groups in microblogs at scale., , , , , , and . CSCW, page 197-210. ACM, (2014)On optimal power sharing for joint sensing and data transmission in cooperative cognitive radio networks., , , and . NCC, page 1-6. IEEE, (2015)Report on the Second Workshop on Exploitation of Social Media for Emergency Relief and Preparedness (SMERP 2018) at the Web Conference (WWW) 2018., , , , , and . SIGIR Forum, 52 (2): 163-168 (2018)Microblog Retrieval for Post-Disaster Relief: Applying and Comparing Neural IR Models., , , and . CoRR, (2017)Characterizing Information Diets of Social Media Users., , , , and . CoRR, (2017)Clustering Model for Microblogging Sites using Dimension Reduction Techniques., , , and . Int. J. Inf. Syst. Model. Des., 10 (2): 26-45 (2019)Incorporating domain knowledge for extractive summarization of legal case documents., , , , and . ICAIL, page 22-31. ACM, (2021)