Author of the publication

Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid.

, , , , and . IEEE Trans. Ind. Informatics, 14 (1): 89-97 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secrecy outage of cooperative relay network with and without eavesdropper's direct link., , and . NCC, page 1-6. IEEE, (2017)Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying., , , , , and . CoRR, (2018)Resource Allocation in Secure Multicarrier AF Relay System Under Individual Power Constraints., and . IEEE Trans. Vehicular Technology, 66 (6): 5070-5085 (2017)An experimental validation of system level design space exploration methodology for energy efficient sensor nodes., , and . ISLPED, page 355-358. ACM, (2009)M-PAM space - time trellis codes for ultra-wideband multiple-input multiple-output communications., and . IET Commun., 2 (4): 514-522 (2008)Partner Selection Based on Optimal Power Allocation for Lifetime Maximization in Cooperative Networks., and . IEEE Trans. Vehicular Technology, 66 (4): 3088-3102 (2017)Improving Capacity in LMDS Networks Using Trellis-Coded Modulation.. EURASIP J. Wireless Comm. and Networking, 2004 (2): 365-373 (2004)Precoding-Aided Secure Time-Domain Index Modulation., and . IEEE Communications Letters, 24 (5): 966-970 (2020)ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems., , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1673-1686 (2022)Channel-based mapping diversity for enhancing the physical layer security in the Internet of Things., , and . PIMRC, page 1-6. IEEE, (2017)