Author of the publication

MIMO-based jamming resilient communication in wireless networks.

, , , , , and . INFOCOM, page 2697-2706. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A mobile malware detection method using behavior features in network traffic., , , , , and . J. Netw. Comput. Appl., (2019)Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment., , , , , , , and . IEEE Internet Things J., 6 (5): 7450-7468 (2019)A First Look at Android Malware Traffic in First Few Minutes., , , , , , and . TrustCom/BigDataSE/ISPA (1), page 206-213. IEEE, (2015)A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT., , , , , , , , , and 9 other author(s). CoRR, (2023)Security Threat Mitigation For Smart Contracts: A Survey., , , , , and . CoRR, (2023)Security and Privacy in the Emerging Cyber-Physical World: A Survey., , , and . CoRR, (2021)Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning., , , , , , and . Comput. Secur., (2021)NELoRa: Towards Ultra-low SNR LoRa Communication with Neural-enhanced Demodulation., , , , , , , , , and . SenSys, page 56-68. ACM, (2021)EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion., and . CNS, page 191-199. IEEE, (2021)Efficient Signature Generation for Classifying Cross-Architecture IoT Malware., , , , and . CNS, page 1-9. IEEE, (2018)