Author of the publication

Intrusion Detection for WiFi Network: A Deep Learning Approach.

, , , and . WICON, volume 264 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 95-104. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survey and Performance Evaluation of the Upcoming Next Generation WLAN Standard - IEEE 802.11ax., , , , , , , , , and 3 other author(s). CoRR, (2018)Content Replication in a Distributed and Controlled Environment.. J. Parallel Distrib. Comput., 59 (2): 229-251 (1999)An Antenna Co-Design Dual Band RF Energy Harvester., , , , , and . IEEE Trans. on Circuits and Systems, 60-I (12): 3256-3266 (2013)A Refined Performance Characterization of Longest-Queue-First Policy in Wireless Networks., , and . IEEE/ACM Trans. Netw., 19 (5): 1382-1395 (2011)Stationary patterns of the stage-structured predator-prey model with diffusion and cross-diffusion., and . Mathematical and Computer Modelling, 54 (5-6): 1380-1393 (2011)Performance analysis of a service-dependent handoff scheme in voice/data integrated cellular mobile systems., , and . Computer Networks, 50 (5): 707-730 (2006)Distributed distance measurement for large-scale networks., , , , and . Computer Networks, 41 (2): 177-192 (2003)Retrieval and freshness thresholds in hierarchical caching systems., , and . Computer Networks, 44 (2): 235-246 (2004)A fast image dehazing algorithm based on negative correction., , , and . Signal Processing, (2014)Sufficient conditions for generalized Orthogonal Matching Pursuit in noisy case., , , and . Signal Processing, (2015)