Author of the publication

Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum Sharing.

, , , and . IEEE Trans. Cogn. Comm. & Networking, 5 (3): 625-636 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention., , , and . IEEE Network, 27 (3): 16-21 (2013)Network anomaly detection with incomplete audit data., and . Computer Networks, 51 (13): 3935-3955 (2007)Providing services using network-based humanoids in a home environment., , , , and . IEEE Trans. Consumer Electronics, 57 (4): 1628-1636 (2011)A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks., , and . IEEE Trans. Parallel Distrib. Syst., 18 (5): 577-588 (2007)Control Channel Establishment in Cognitive Radio Networks using Channel Hopping., , and . IEEE Journal on Selected Areas in Communications, 29 (4): 689-703 (2011)Independent Joint Learning: A novel task-to-task transfer learning scheme for robot models., , and . ICRA, page 5679-5684. IEEE, (2014)A Control Architecture to Achieve Manipulation Task Goals for a Humanoid Robot., , , , and . ICRA, page 206-212. IEEE Computer Society, (1998)Stasis Trap: Cross-Layer Stealthy Attacks in Wireless Ad Hoc Networks., , and . GLOBECOM, IEEE, (2006)Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum., , and . INFOCOM, page 1566-1574. IEEE, (2012)A Knowledge-Based Service Approach for Human-Centered Robots., , , and . RO-MAN, page 582-587. IEEE, (2007)