Author of the publication

Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments.

, , , , , and . Entropy, 21 (7): 700 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approach to stress tests in SIP environment based on marginal analysis., and . Telecommun. Syst., 52 (3): 1583-1593 (2013)On packet marking and Markov modeling for IP Traceback: A deep probabilistic and stochastic analysis., , , and . Comput. Networks, (2020)Adaptive multiple access assists multiple users over multiple-input-multiple-output non-orthogonal multiple access wireless networks., and . Int. J. Commun. Syst., (2021)Evaluation of Device-Independent Internet Spatial Location., , , and . ISPRS Int. J. Geo Inf., 6 (6): 155 (2017)A deep stochastical and predictive analysis of users mobility based on Auto-Regressive processes and pairing functions., , and . J. Netw. Comput. Appl., (2020)An efficient algorithm to mine high average-utility itemsets., , , , , and . Adv. Eng. Informatics, 30 (2): 233-243 (2016)Security and Reliability Analysis of Satellite-Terrestrial Multi-Relay Networks with Imperfect CSI., , , , , and . CoRR, (2022)A sanitization approach for hiding sensitive itemsets based on particle swarm optimization., , , , , and . Eng. Appl. Artif. Intell., (2016)Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments., , , , , and . Entropy, 21 (7): 700 (2019)Study of the Efficiency of Fog Computing in an Optimized LoRaWAN Cloud Architecture., , and . Sensors, 21 (9): 3159 (2021)