Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Location Privacy-Aware and Energy-Efficient Offloading for Distributed Edge Computing., , , and . IEEE Trans. Wirel. Commun., 22 (11): 7975-7988 (November 2023)On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach., , and . HotSoS, page 45-51. ACM, (2017)No time to demodulate - fast physical layer verification of friendly jamming., , , , and . MILCOM, page 653-658. IEEE, (2015)Collaborative IDS Configuration: A Two-Layer Game-Theoretical Approach., , and . GLOBECOM, page 1-7. IEEE, (2016)A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks., , , and . INFOCOM, page 1-9. IEEE, (2016)Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty., , , and . GLOBECOM, page 1-6. IEEE, (2015)A spline filter for multidimensional nonlinear state estimation., , , , and . Signal Process., (2014)Modified Murty's Algorithm for Diverse Multitarget Top Hypothesis Extraction., , , and . IEEE Trans. Aerosp. Electron. Syst., 49 (1): 602-610 (2013)MCR Decoding: A MIMO approach for defending against wireless jamming attacks., , , , and . CNS, page 133-138. IEEE, (2014)Dynamic adaptive anti-jamming via controlled mobility., , and . CNS, page 1-9. IEEE, (2013)