Author of the publication

On Ordered Transmission Based Distributed Gaussian Shift-in-Mean Detection Under Byzantine Attacks.

, , , , , and . IEEE Trans. Signal Process., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threshold-based cooperative communication of energy harvesting active networked tags., , , , and . Int. J. Ad Hoc Ubiquitous Comput., 24 (4): 225-236 (2017)Cooperative secret delivery in wireless sensor networks., and . Int. J. Ad Hoc Ubiquitous Comput., 14 (4): 226-237 (2013)On the Maximum Size of Block Codes Subject to a Distance Criterion., , , , and . IEEE Trans. Inf. Theory, 65 (6): 3751-3757 (2019)Delay-Constrained Input-Queued Switch., , , , and . IEEE J. Sel. Areas Commun., 36 (11): 2464-2474 (2018)Distributed fault-tolerant classification in wireless sensor networks., , , and . IEEE J. Sel. Areas Commun., 23 (4): 724-734 (2005)Triple-fault-tolerant binary MDS array codes with asymptotically optimal repair., , , and . ISIT, page 839-843. IEEE, (2017)Permutation Trellis Coded Multi-level FSK Signaling to Mitigate Primary User Interference in Cognitive Radio Networks., , , , and . CoRR, (2014)Fast Ecoding/Decoding Algorithms for Reed-Solomon Erasure Codes., , and . CoRR, (2014)Maximum-Likelihood Priority-First Search Decodable Codes for Combined Channel Estimation and Error Protection, , , and . CoRR, (2007)Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques., , , , and . CoRR, (2014)