Author of the publication

A game-theoretic analysis of energy-depleting jamming attacks.

, , , , and . ICNC, page 100-104. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secret Key Agreement by LLR Thresholding and Syndrome Feedback over AWGN Channel., , and . IEEE Communications Letters, 18 (1): 26-29 (2014)Low-power Secret-key Agreement over OFDM, , , , , , , and . CoRR, (2013)Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis., and . IEEE Trans. Inf. Forensics Secur., 9 (10): 1708-1719 (2014)Detection of GNSS Spoofing by a Receiver in Space via Fusion of Consistency Metrics., , , , , and . ICC, page 1-6. IEEE, (2020)A Nonlinear Method for Stochastic Spectrum Estimation in the Modeling of Musical Sounds., , and . IEEE Trans. Speech Audio Process., 15 (2): 531-541 (2007)Comments on Örthogonal multiple carrier data transmission"., , and . Eur. Trans. Telecommun., 9 (6): 571-572 (1998)Resource allocation for secret transmissions on parallel Rayleigh channels., , and . ICC, page 2209-2214. IEEE, (2014)A game-theoretic analysis of energy-depleting jamming attacks., , , , and . ICNC, page 100-104. IEEE Computer Society, (2017)High SNR secrecy rates with OFDM signaling over fading channels., , and . PIMRC, page 2692-2697. IEEE, (2010)LQG-like control of scalar systems over communication channels: The role of data losses, delays and SNR limitations., , , and . Autom., 50 (12): 3155-3163 (2014)