Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Jammer detection in M-QAM-OFDM by learning a Dynamic Bayesian Model for the Cognitive Radio., , , , , and . EUSIPCO, page 1-5. IEEE, (2019)A Novel Resource Allocation for Anti-jamming in Cognitive-UAVs: an Active Inference Approach., , , , and . CoRR, (2022)Defense against stealthy jamming attacks in wide-band radios: A physical layer approach., , and . GlobalSIP, page 497-501. IEEE, (2017)A particle filter based sequential trajectory classifier for behavior analysis in video surveillance., , and . ICIP, page 3690-3694. IEEE, (2015)Exploiting an event based state estimator in presence of sparse measurements in video analytics., , , and . ICASSP, page 1871-1875. IEEE, (2014)Jammer detection algorithm for wide-band radios using spectral correlation and neural networks., , , , and . IWCMC, page 246-251. IEEE, (2017)Secure Smart Cameras by Aggregate-Signcryption with Decryption Fairness for Multi-Receiver IoT Applications., , and . Sensors, 19 (2): 327 (2019)Moving objects self-generated illumination variations removal for automatic video-surveillance systems., , and . VCIP, volume 5150 of Proceedings of SPIE, page 414-421. SPIE, (2003)Smart cameras with onboard signcryption for securing IoT applications., , and . GIoTS, page 1-6. IEEE, (2017)Aggregate-Signcryption for Securing Smart Camera IoT Applications., , , and . GIoTS, page 1-6. IEEE, (2018)