Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Data Capturing for Network Forensics in Cognitive Radio Networks., , and . IEEE/ACM Trans. Netw., 22 (6): 1988-2000 (2014)No-reference image quality assessment in contourlet domain., , , , and . Neurocomputing, 73 (4-6): 784-794 (2010)Physical layer challenge-response authentication in wireless networks with relay., , , and . INFOCOM, page 1276-1284. IEEE, (2014)Physical layer key agreement under signal injection attacks., and . CNS, page 254-262. IEEE, (2015)FSA: A Fast Coordination Scheme for Opportunistic Routing., , and . ICC, page 1-5. IEEE, (2009)Jamming-Resistant Communication: Channel Surfing without Negotiation., , and . ICC, page 1-6. IEEE, (2010)A comparative study on interpolation methods for controlled cardiac CT., , , , and . Int. J. Imaging Systems and Technology, 17 (2): 91-98 (2007)Edge-prioritized channel- and traffic-aware uplink Carrier Aggregation in LTE-advanced systems., , , , and . WOWMOM, page 1-9. IEEE Computer Society, (2012)Detecting spectrum misuse in wireless networks., , , and . MASS, page 245-253. IEEE Computer Society, (2012)Live Video Forensics: Source Identification in Lossy Wireless Networks., , , and . IEEE Trans. Information Forensics and Security, 10 (1): 28-39 (2015)