116 results on '"Keshavarz-Haddad, Alireza"'
Search Results
2. Network selection in heterogeneous dense networks based on user clustering
3. Correction to: Network selection in heterogeneous dense networks based on user clustering
4. A deep learning framework for blockage mitigation and duration prediction in mmWave wireless networks
5. Effective website fingerprinting attack based on the first packet direction only
6. Proportional Fair RAT Aggregation in HetNets
7. Statistical-Based Privacy-Preserving Scheme with Malicious Consumers Identification for Smart Grid
8. Performance analysis of joint dual relay selection and physical layer network coding in two-way relay channels
9. Optimal Relay Location in Diffusion Based Molecular Communications
10. Gated Recurrent Units for Blockage Mitigation and Duration Prediction in Mmwave Wireless
11. Performance evaluation of joint relay selection and network coding for multi-source and multi-destination relay network
12. Joint relay selection and opportunistic physical layer network coding for two-way relay channels
13. Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks
14. A new probabilistic classifier based on decomposable models with application to internet traffic
15. Probabilistic spectrum sensing data falsification attack in cognitive radio networks
16. An entropy-based distance measure for analyzing and detecting metamorphic malware
17. Routing Protocols for Border Surveillance Using ZigBee-Based Wireless Sensor Networks
18. Outage minimisation for two‐way piece‐wise and forward (PF) relaying with SWIPT based energy harvesting
19. Deep Transfer Learning for Cross-Device Channel Classification in mmWave Wireless
20. Routing Protocols for Border Surveillance Using ZigBee-Based Wireless Sensor Networks
21. Max-Link Relay Selection with Physical Layer Network Coding in Two-Way Relay Networks
22. Fair Initial Access Design for mmWave Wireless
23. Proportional Fair RAT Aggregation in HetNets
24. Performance Evaluation of Network-Coded Decode-and-Forward Cooperation with Smart Relay Selection
25. MAP detector performance analysis in diffusion-based relaying molecular communications
26. Inter-symbol interference reduction channel codes based on time gap in diffusion-based molecular communications
27. Security Challenges and Attacks in M2M Communications
28. A New Statistical Method for Wormhole Attack Detection in MANETs
29. Sybil Attack Detection in Urban VANETs Based on RSU Support
30. Performance Evaluation of Joint Relay Selection and Network Coding in Two-Way Relaying Wireless Communication Networks
31. PAFD: Phased Array Full-Duplex
32. Arena Function: A Framework for Computing Capacity Bounds in Wireless Networks
33. Receiver design for pulse position modulation technique in diffusion-based molecular communication
34. Selective physical layer network coding in bidirectional relay channel
35. A New Distributed Group Key Management Scheme for Wireless Sensor Networks
36. An entropy-based distance measure for analyzing and detecting metamorphic malware
37. Max-Min Fair Resource Allocation in HetNets: Distributed Algorithms and Hybrid Architecture
38. Performance analysis of Decode and Forward Relay network in Diffusion based Molecular Communication
39. HetNets Selection by Clients: Convergence, Efficiency, and Practicality
40. A selective physical layer network coding for wireless two-way relaying
41. A new channel code for decreasing inter-symbol-interference in diffusion based molecular communications
42. A realistic receiver model for neuro-spike communication
43. Blind recovery of convolutional codes over noisy channels
44. A novel location-based key distribution scheme for large-scale stationary wireless networks
45. Internet traffic classification using multiple classifiers
46. Internet traffic classification using Hidden Naive Bayes model
47. A distributed patching scheme for controlling mobile malware infection
48. Convergence properties of general network selection games
49. FD2: A directional full duplex communication system for indoor wireless networks
50. A Concise Model to Evaluate Security of SCADA Systems based on Security Standards
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.