Author of the publication

On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks.

, , and . CISS, page 1-6. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A multistep linear prediction approach to blind asynchronous CDMA channel estimation and equalization., and . IEEE Journal on Selected Areas in Communications, 19 (6): 1090-1102 (2001)Stability control for biped walking based on phase modification during double support period., , , , , , , , , and . ROBIO, page 1290-1295. IEEE, (2014)On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks., , and . CISS, page 1-6. IEEE, (2010)A complete analysis of the global dynamics of a diffusive predator and toxic prey model., , , and . Applied Mathematics and Computation, (2016)End-to-End Delay in Multi-Hop Wireless Networks With Random Relay Deployment., , , and . ICNC, page 513-517. IEEE Computer Society, (2018)On the Stability of Hybrid ALOHA., and . CISS, page 570-575. IEEE, (2007)Brain functional connectivity analysis using mutual information., , , and . GlobalSIP, page 542-546. IEEE, (2015)Channel identification and signal separation for long-code CDMA systems using multistep linear prediction method., , , and . ICC, page 2437-2441. IEEE, (2004)Architecture design of mobile access coordinated wireless sensor networks., , , and . ICC, page 1720-1724. IEEE, (2013)Cooperative sensing in cognitive networks under malicious attack., , , and . ICASSP, page 3004-3007. IEEE, (2011)