Author of the publication

Secure Transmission in Interference Alignment (IA)-Based Networks with Artificial Noise.

, , , and . VTC Spring, page 1-5. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Data Fusion Approach to Context-Aware Service Delivery in Heterogeneous Network Environments., and . ANT/MobiWIS, volume 5 of Procedia Computer Science, page 312-319. Elsevier, (2011)Local fast re-authentication protocol for 3G-WLAN interworking architecture., and . WTS, page 1-8. IEEE, (2007)Connectivity-Aware Minimum-Delay Geographic Routing with Vehicle Tracking in VANETs., and . ADHOCNETS, volume 28 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 256-267. Springer, (2009)Efficient Security Solution for Information-centric Networking., , , and . GreenCom/iThings/CPScom, page 1290-1295. IEEE, (2013)Energy Management Analysis and Enhancement in IEEE 802.16e WirelessMAN., , and . IEEE Trans. Vehicular Technology, 58 (7): 3738-3752 (2009)A Time Efficient Tag Identification Algorithm Using Dual Prefix Probe Scheme (DPPS)., , , and . IEEE Signal Process. Lett., 23 (3): 386-389 (2016)Utility-Based Rate-Controlled Parallel Wireless Transmission of Multimedia Streams with Multiple Importance Levels., and . IEEE Trans. Mob. Comput., 8 (1): 81-92 (2009)Cross-Layer Optimization for Multimedia Transport over Multicode CDMA Networks., , and . IEEE Trans. Mob. Comput., 10 (6): 810-820 (2011)A network coding scheme to improve throughput for IEEE 802.11 WLAN., , , and . QSHINE, page 90-93. IEEE, (2014)Electricity Theft Detection in AMI Using Customers' Consumption Patterns., , and . IEEE Trans. Smart Grid, 7 (1): 216-226 (2016)