Author of the publication

Correlation-Statistics-Based Spectrum Sensing Exploiting Energy and Polarization for Dual-Polarized Cognitive Radios.

, , , and . IEEE Trans. Wireless Communications, 14 (3): 1533-1554 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Multiparty Online Services Via Certification of Symbolic Transactions., , , and . IEEE Symposium on Security and Privacy, page 833-849. IEEE Computer Society, (2015)Security Vulnerabilities - From Data Analysis to Protection Mechanisms., , , and . WORDS Fall, page 331-338. IEEE Computer Society, (2003)A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities., , , and . DSN, page 605-614. IEEE Computer Society, (2003)An Easily Fabricated Linear Piezoelectric Actuator Using Sandwich Longitudinal Vibrators With Four Driving Feet., , , , and . IEEE Access, (2019)Brahmastra: Driving Apps to Test the Security of Third-Party Components., , , , , , , , and . USENIX Security Symposium, page 1021-1036. USENIX Association, (2014)An Adaptive Framework for Multi-Vehicle Ground Speed Estimation in Airborne Videos., , , , , and . Remote Sensing, 11 (10): 1241 (2019)Biprism-based monocular stereovision system parameter optimization., , , , and . J. Electronic Imaging, 27 (03): 033020 (2018)A novel comprehensive wave-form MS data processing method., , , , , , and . Bioinformatics, 25 (6): 808-814 (2009)Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks., , , and . IEEE Internet of Things Journal, 4 (1): 29-39 (2017)An Efficient Fog-Assisted Unstable Sensor Detection Scheme with Privacy Preserved., , and . CoRR, (2017)