Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compressed-Sensing-Based Pilot Contamination Attack Detection for NOMA-IoT Communications., , , , and . IEEE Internet Things J., 7 (8): 7764-7772 (2020)Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification over Encrypted Wi-Fi Traffic., , , , , and . CoRR, (2019)Multiuser Scheduling in Centralized Cognitive Radio Networks: A Multi-Armed Bandit Approach., , , and . IEEE Trans. Cogn. Commun. Netw., 8 (2): 1074-1091 (2022)Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise., , , , and . INFOCOM, page 460-468. IEEE, (2019)Self-Unaware Adversarial Multi-Armed Bandits With Switching Costs., , and . IEEE Trans. Neural Networks Learn. Syst., 34 (6): 2908-2922 (June 2023)Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic., , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Pilot Contamination Attack Detection for NOMA in 5G mm-Wave Massive MIMO Networks., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Impact of Mobility on Physical Layer Security Over Wireless Fading Channels., , , and . IEEE Trans. Wirel. Commun., 17 (12): 7849-7864 (2018)Online-Learning-Based Defense Against Jamming Attacks in Multichannel Wireless CPS., , , , and . IEEE Internet Things J., 8 (17): 13278-13290 (2021)Online learning-based optimal primary user emulation attacks in cognitive radio networks., , , and . CNS, page 100-108. IEEE, (2016)