Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigation of Byzantine Attacks on Distributed Detection Systems Using Audit Bits., , and . IEEE Trans. Signal and Information Processing over Networks, 4 (1): 18-32 (2018)Subspace Detection from Structured Union of Subspaces via Linear Sampling, , and . CoRR, (2013)Sparsity-Aware Sensor Collaboration for Linear Coherent Estimation., , , and . CoRR, (2014)Permutation Trellis Coded Multi-level FSK Signaling to Mitigate Primary User Interference in Cognitive Radio Networks., , , , and . CoRR, (2014)Micro-Doppler Parameter Estimation via Parametric Sparse Representation and Pruned Orthogonal Matching Pursuit., and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 7 (12): 4937-4948 (2014)An MRF Based Approach for Simultanous Land Cover Mapping and Cast Shadow Removal., , , and . IGARSS, page 2133-2136. IEEE, (2006)Decentralized and Collaborative Subspace Pursuit: A Communication-Efficient Algorithm for Joint Sparsity Pattern Recovery., , and . CoRR, (2014)Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques., , , , and . CoRR, (2014)On Strategic Multi-Antenna Jamming in Centralized Detection Networks., , and . CoRR, (2016)Joint Sparsity Pattern Recovery under Communication Constraints: Greedy Approaches., and . CoRR, (2013)