Author of the publication

Efficient Ordered-Transmission Based Distributed Detection Under Data Falsification Attacks.

, , , , , and . IEEE Signal Process. Lett., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximum-Likelihood Priority-First Search Decodable Codes for Combined Channel Estimation and Error Protection, , , and . CoRR, (2007)Permutation Trellis Coded Multi-level FSK Signaling to Mitigate Primary User Interference in Cognitive Radio Networks., , , , and . CoRR, (2014)Fast Ecoding/Decoding Algorithms for Reed-Solomon Erasure Codes., , and . CoRR, (2014)An Improved MDS Condition of Blaum-Bruck-Vardy Codes., , and . ISTC, page 1-5. IEEE, (2018)A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge., , , , and . INFOCOM, IEEE, (2004)Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks., , and . Comput. Commun., 33 (13): 1524-1530 (2010)On the Maximum Size of Block Codes Subject to a Distance Criterion., , , , and . IEEE Trans. Inf. Theory, 65 (6): 3751-3757 (2019)Cooperative secret delivery in wireless sensor networks., and . Int. J. Ad Hoc Ubiquitous Comput., 14 (4): 226-237 (2013)Threshold-based cooperative communication of energy harvesting active networked tags., , , , and . Int. J. Ad Hoc Ubiquitous Comput., 24 (4): 225-236 (2017)Delay-Constrained Input-Queued Switch., , , , and . IEEE J. Sel. Areas Commun., 36 (11): 2464-2474 (2018)