Author of the publication

On differential privacy-preserving movements of unmanned aerial vehicles.

, , and . ICC, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks., and . International Conference on Wireless Networks, page 144-150. CSREA Press, (2004)Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks., , , and . ICC, page 1-6. IEEE, (2009)A Real Time Adaptive Scheduling Scheme for Multi-Service Flows in WiMAX Networks., , and . GLOBECOM, page 1652-1656. IEEE, (2008)A Trust-Based Routing Protocol for Ad Hoc Networks., , and . MWCN, volume 162 of IFIP, page 251-262. Kluwer/Springer, (2004)Towards an efficient failure detection in MANETs., , , and . Wirel. Commun. Mob. Comput., 16 (17): 2939-2955 (2016)Coalitional game-based behavior analysis for spectrum access in cognitive radios., , , , and . Wirel. Commun. Mob. Comput., 16 (14): 1910-1921 (2016)CONTVERB: Continuous Virtual Emotion Recognition Using Replaceable Barriers for Intelligent Emotion-Based IoT Services and Applications., , , and . IEEE Netw., 34 (5): 269-275 (2020)New User Association Scheme Based on Multi-Objective Optimization for 5G Ultra-Dense Multi-RAT HetNets., , , and . ICC, page 1-6. IEEE, (2018)A game-theoretic approach for non-overlapping communities detection., , , and . IWCMC, page 1315-1320. IEEE, (2017)Detecting DoS attacks in WSN based on clustering technique., , , and . WCNC, page 2214-2219. IEEE, (2013)