Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Live Video Forensics: Source Identification in Lossy Wireless Networks., , , and . IEEE Trans. Information Forensics and Security, 10 (1): 28-39 (2015)Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks., , , and . IEEE Trans. Information Forensics and Security, 8 (9): 1497-1507 (2013)Opportunistic Routing in Multi-Radio Multi-Channel Multi-Hop Wireless Networks., , and . IEEE Trans. Wireless Communications, 9 (11): 3512-3521 (2010)No-reference image quality assessment in contourlet domain., , , , and . Neurocomputing, 73 (4-6): 784-794 (2010)Physical layer challenge-response authentication in wireless networks with relay., , , and . INFOCOM, page 1276-1284. IEEE, (2014)Physical layer key agreement under signal injection attacks., and . CNS, page 254-262. IEEE, (2015)Efficient Data Capturing for Network Forensics in Cognitive Radio Networks., , and . IEEE/ACM Trans. Netw., 22 (6): 1988-2000 (2014)Edge-prioritized channel- and traffic-aware uplink Carrier Aggregation in LTE-advanced systems., , , , and . WOWMOM, page 1-9. IEEE Computer Society, (2012)Steering-assist control system on curved road using car-to-car communication., , , , , , and . ITSC, page 1-6. IEEE, (2013)Quality-of-experience of streaming video: Interactions between presentation quality and playback stalling., , and . ICIP, page 2405-2409. IEEE, (2016)