Author of the publication

Analysis of primary user emulation attack with motional secondary users in cognitive radio networks.

, , and . PIMRC, page 956-961. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards energy-efficient storage placement in large scale sensor networks., , , and . Frontiers of Computer Science, 8 (3): 409-425 (2014)One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks., , , and . Ad Hoc Networks, 11 (8): 2500-2511 (2013)DICH: A framework for discovering implicit communities hidden in tweets., , and . World Wide Web, 18 (4): 795-818 (2015)Check out the Rules: Towards Time-Efficient Rule Checking over RFID Tags., , , and . MONET, 19 (4): 524-533 (2014)Ergodic capacity region for the uplink OFDMA network., , and . WCSP, page 1-6. IEEE, (2012)Maximum-minimum eigenvalue detection-based method to mitigate the effect of the PUEA in cognitive radio networks., , , and . WCSP, page 1-5. IEEE, (2011)Mask Estimation and Refinement for MFT-based Robust Speaker Verification., , and . INTERSPEECH, page 2654-2657. ISCA, (2012)REPAIR: A Reliable Partial-Redundancy-Based Router in NoC., , and . NAS, page 173-177. IEEE Computer Society, (2013)A Reliable Collaborative Spectrum Sensing Scheme Based on the ROCQ Reputation Model for Cognitive Radio Networks., , , and . VTC Spring, page 1-5. IEEE, (2012)A novel rateless coding scheme with gradually incremental degree under feedback., , and . CCNC, page 575-580. IEEE, (2014)