Author of the publication

A game-theoretic analysis of energy-depleting jamming attacks.

, , , , and . ICNC, page 100-104. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Retransmission, Compression and Channel Coding for Data Fidelity under Energy Constraints., , , and . CoRR, (2017)An Interference-Aware Channel Access Strategy for WSNs Exploiting Temporal Correlation., , , and . IEEE Trans. Commun., 67 (12): 8585-8597 (2019)Minimizing Data Distortion of Periodically Reporting IoT Devices with Energy Harvesting., , , and . SECON, page 1-9. IEEE, (2017)An Analytical Model for CBAP Allocations in IEEE 802.11ad., , , and . CoRR, (2019)A Random Access Scheme to Balance Energy Efficiency and Accuracy in Monitoring Applications., , , and . ITA, page 1-6. IEEE, (2018)A Game-Theoretic Analysis of Energy-Depleting Jamming Attacks with a Learning Counterstrategy., , , , and . ACM Trans. Sens. Networks, 16 (1): 6:1-6:25 (2020)Access Control for IoT Nodes With Energy and Fidelity Constraints., , , and . IEEE Trans. Wirel. Commun., 17 (5): 3242-3257 (2018)Enabling LTE RACH Collision Multiplicity Detection via Machine Learning., , , and . CoRR, (2018)Bike sharing as a key smart city service: State of the art and future developments., , , , and . MOCAST, page 1-6. IEEE, (2018)The Potential of mmWaves in Smart Industry: Manufacturing at 60 GHz., , and . ADHOC-NOW, volume 11104 of Lecture Notes in Computer Science, page 64-76. Springer, (2018)