Author of the publication

Secure wireless communications via cooperative relaying and jamming.

, , , and . GLOBECOM Workshops, page 849-853. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When target motion matters: Doppler coverage in radar sensor networks., , and . INFOCOM, page 1169-1177. IEEE, (2013)Joint bandwidth and power allocation in cognitive radio networks under fading channels., , and . ICASSP, page 2976-2979. IEEE, (2011)A Cooperative Relay Scheme for Secondary Communication in Cognitive Radio Networks., , , , and . GLOBECOM, page 3106-3111. IEEE, (2008)Social group utility maximization game with applications in mobile social networks., , and . Allerton, page 1496-1500. IEEE, (2013)Truthful Quality-Aware Data Crowdsensing for Machine Learning., and . SECON, page 1-9. IEEE, (2019)Joint Bandwidth and Power Allocation With Admission Control in Wireless Multi-User Networks With and Without Relaying., , and . IEEE Trans. Signal Processing, 59 (4): 1801-1813 (2011)Recent Advances in Cloud-Aware Mobile Fog Computing., , , and . Wireless Communications and Mobile Computing, (2019)A Coverage Theory of Bistatic Radar Networks: Worst-Case Intrusion Path and Optimal Deployment, , and . CoRR, (2012)Social Group Utility Maximization, , , and . Springer Briefs in Electrical and Computer Engineering Springer, (2014)Privacy-Preserving Database Assisted Spectrum Access for Industrial Internet of Things: A Distributed Learning Approach., , , , , and . IEEE Trans. Ind. Electron., 67 (8): 7094-7103 (2020)