Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Bargaining Game for Channel Access in Dynamic Spectrum Access Networks., and . GLOBECOM, page 1-6. IEEE, (2010)Distributed Detection in Tree Topologies with Byzantines., , , and . CoRR, (2013)Audit Bit Based Distributed Bayesian Detection in the Presence of Byzantines., , and . IEEE Trans. Signal and Information Processing over Networks, 4 (4): 643-655 (2018)Redundancy-based Mitigation of Jamming Attacks., and . CISS, page 1-6. IEEE, (2020)Prospect Theoretic Utility Based Human Decision Making in Multi-Agent Systems., , , , and . IEEE Trans. Signal Process., (2020)Optimization of Cyber System Survivability Under Attacks Using Redundancy of Components., and . CISS, page 1-6. IEEE, (2019)A Game Theoretic power control framework for spectrum sharing in competitive environments., , and . ACSSC, page 1493-1497. IEEE, (2013)On the performance analysis of data fusion schemes with Byzantines., , and . ICASSP, page 7411-7415. IEEE, (2014)Enhancements to Cognitive Radio Based IEEE 802.22 Air-Interface., , , and . ICC, page 5155-5160. IEEE, (2007)Optimal Auction Mechanism for Spectrum Allocation in Cognitive Radio Networks under Uncertain Spectrum Availability., , and . CoRR, (2014)