Author of the publication

Energy theft detection for AMI using principal component analysis based reconstructed data.

, , and . IET Cyper-Phys. Syst.: Theory & Appl., 4 (2): 179-185 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Energy Efficiency with Poisson Point Process Distributed Jammers., and . WF-IoT, page 19-23. IEEE, (2019)Channel-based mapping diversity for enhancing the physical layer security in the Internet of Things., , and . PIMRC, page 1-6. IEEE, (2017)Direction of Arrival Estimation and Beamforming of Multiple Coherent UWB Signals., and . ICC, page 1-5. IEEE, (2010)Precoding-Aided Secure Time-Domain Index Modulation., and . IEEE Communications Letters, 24 (5): 966-970 (2020)M-PAM space - time trellis codes for ultra-wideband multiple-input multiple-output communications., and . IET Commun., 2 (4): 514-522 (2008)Resource Allocation in Secure Multicarrier AF Relay System Under Individual Power Constraints., and . IEEE Trans. Vehicular Technology, 66 (6): 5070-5085 (2017)An experimental validation of system level design space exploration methodology for energy efficient sensor nodes., , and . ISLPED, page 355-358. ACM, (2009)Improving Capacity in LMDS Networks Using Trellis-Coded Modulation.. EURASIP J. Wireless Comm. and Networking, 2004 (2): 365-373 (2004)Secrecy outage of cooperative relay network with and without eavesdropper's direct link., , and . NCC, page 1-6. IEEE, (2017)Partner Selection Based on Optimal Power Allocation for Lifetime Maximization in Cooperative Networks., and . IEEE Trans. Vehicular Technology, 66 (4): 3088-3102 (2017)