Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks., , , and . ICC, page 1-6. IEEE, (2009)Intelligent Agents for QoS Control and Adaptation in Distributed Multimedia Systems.. ICEIS, page 501-508. (1999)X-haul Outage Compensation in 5G/6G Using Reconfigurable Intelligent Surfaces., , and . CoRR, (2022)Data Quality Improvements for Internet of Things Using Artificial Neural Networks., and . IEEE ANTS, page 1-6. IEEE, (2020)Study of Spiking Neural Network-Based Regressor on Applications in Digital Predistortion for Power Amplifiers., , , and . CommNet, page 1-7. IEEE, (2023)Defensive Randomization Against Adversarial Attacks in Image-Based Android Malware Detection., , , and . ICC, page 5072-5077. IEEE, (2023)Lightweight TLS 1.3 Handshake for C-ITS Systems., , , , , and . ICC, page 1432-1437. IEEE, (2023)A Data Cleansing Approach In Smart Home Environments Using Artificial Neural Networks., , and . WiMob, page 1-6. IEEE, (2020)Parallel Committees: High-Performance, Scalable, Secure and Fault-Tolerant Data Replication Using a Novel Sharding Technique., and . BCCA, page 546-553. IEEE, (2023)Scaling a Blockchain System from Eventual to Full Atomicity Using Confederation Approach., , and . BRAINS, page 1-2. IEEE, (2023)