Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information-Centric Offloading in Cellular Networks with Coordinated Device-to-Device Communication., , , and . CoRR, (2016)Optimization of orthogonal wavelets for image compression., and . ICASSP (3), page 653-656. IEEE, (2004)A Joint TOA/AOA Constrained Minimization Method for Locating Wireless Devices in Non-Line-of-Sight Environment., , and . IEEE Trans. Veh. Technol., 58 (1): 468-472 (2009)On the evaluation of the 2-D complex integral in 2-D downsampling.. Signal Process., 79 (2): 187-196 (1999)A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks., , and . IEEE Trans. Signal Inf. Process. over Networks, 4 (2): 325-337 (2018)Multiple packet reception in wireless ad hoc networks using polynomial phase-modulating sequences., , , and . IEEE Trans. Signal Process., 51 (8): 2093-2110 (2003)White noise reduction for wideband linear array signal processing., , and . IET Signal Process., 12 (3): 335-345 (2018)Optimal fusion rule for distributed detection in clustered wireless sensor networks., , , and . EURASIP J. Adv. Signal Process., (2016)Tight Bounds for Ergodic Capacity of Dual-Hop Fixed-Gain Relay Networks under Rayleigh Fading., , and . IEEE Commun. Lett., 15 (4): 413-415 (2011)A Deep Learning Approach Combining Autoencoder with One-class SVM for DDoS Attack Detection in SDNs., , , , , and . COMNET, page 1-6. IEEE, (2020)