Author of the publication

An Analytical Model for Interference Alignment in Multi-Hop MIMO Networks.

, , , , , and . IEEE Trans. Mob. Comput., 15 (1): 17-31 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

mCore: Achieving Sub-millisecond Scheduling for 5G MU-MIMO Systems., , , and . INFOCOM, page 1-10. IEEE, (2021)Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication., , , , and . ACSAC, page 681-693. ACM, (2020)Adaptive QoS control for real-time video communication over wireless channels., , , , and . Int. J. Ad Hoc Ubiquitous Comput., 1 (1/2): 27-37 (2005)Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (1): 67-76 (2022)On minimizing end-to-end delay with optimal traffic partitioning., , and . IEEE Trans. Veh. Technol., 55 (2): 681-690 (2006)On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication., , , , and . IEEE Wirel. Commun. Lett., 1 (4): 324-327 (2012)On prefetching in hierarchical caching systems., , , and . ICC, page 814-818. IEEE, (2003)Proximity-based security using ambient radio signals., , , and . ICC, page 1609-1613. IEEE, (2013)NoiSec: Harnessing Noise for Security against Adversarial and Backdoor Attacks., , , and . CoRR, (2024)Coping Uncertainty in Coexistence via Exploitation of Interference Threshold Violation., , , , , and . MobiHoc, page 71-80. ACM, (2019)