Author of the publication

Nearly optimal asynchronous blind rendezvous algorithm for Cognitive Radio Networks.

, , , and . SECON, page 371-379. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Local Information Improves Rendezvous in Cognitive Radio Networks., , , , , , , and . SECON, page 352-360. IEEE, (2018)Efficient Rendezvous for Heterogeneous Interference in Cognitive Radio Networks., , , and . IEEE Trans. Wirel. Commun., 19 (1): 91-105 (2020)A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT., , , and . Remote. Sens., 14 (24): 6371 (December 2022)A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX., and . Wirel. Commun. Mob. Comput., (2021)STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means., , , , , , and . Simul. Model. Pract. Theory, (2022)Attack-words Guided Sentence Generation for Textual Adversarial Attack., , , , , and . DSC, page 280-287. IEEE, (2021)A Survey on Translating Embedding based Entity Alignment in Knowledge Graphs., , and . DSC, page 187-194. IEEE, (2021)Adversarial Attacks on ASR Systems: An Overview., , , , , and . CoRR, (2022)Fully distributed algorithms for blind rendezvous in cognitive radio networks., , and . MobiHoc, page 155-164. ACM, (2014)Nearly optimal asynchronous blind rendezvous algorithm for Cognitive Radio Networks., , , and . SECON, page 371-379. IEEE, (2013)