505 results on '"Teng Joon Lim"'
Search Results
2. Federated Learning With Heterogeneous Client Expectations: A Game Theory Approach.
3. Wireless Decentralized Federated Learning with Energy-Constrained Clients.
4. Low-Complexity Beam-Oriented Linearization Approaches for Massive MIMO Transmission.
5. Resource-Efficient Multiview Perception: Integrating Semantic Masking with Masked Autoencoders.
6. Iterative Learning Control Based Digital Pre-Distortion for Mitigating Impairments in MIMO Wireless Transmitters.
7. Deep Reinforcement Learning for Joint Sensor Scheduling and Power Allocation under DoS Attack.
8. MaDe: Malicious Aerial Vehicle Detection using Generalized Likelihood Ratio Test.
9. PIC: Preserving Data Integrity in UAV Assisted Communication.
10. ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection.
11. DRiVe: Detecting Malicious Roadside Units in the Internet of Vehicles With Low Latency Data Integrity.
12. Trust-based adversary detection in edge computing assisted vehicular networks.
13. An Efficient Deep Neural Network Structure for RF Power Amplifier Linearization.
14. Detecting Selective Forwarding using Sentinels in lustered IoT Networks.
15. Iterative Learning Control for Pre-distortion Design in Wideband Direct-Conversion Transmitters.
16. ML-Based Early Detection of IoT Botnets.
17. An Ellipsoidal Set-Membership Approach to Distributed Joint State and Sensor Fault Estimation of Autonomous Ground Vehicles.
18. Modeling and Analysis of HetNets With Interference Management Using Poisson Cluster Process.
19. EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques.
20. Detecting RSU Misbehavior in Vehicular Edge Computing.
21. Detecting Selective Modification in Vehicular Edge Computing.
22. A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks.
23. Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks.
24. Malicious relay detection using sentinels: A stochastic geometry framework.
25. Detecting Forwarding Misbehavior In Clustered IoT Networks.
26. Detecting Rogue Small-Cell Attacks Using Guard Nodes.
27. Sentinel Based Malicious Relay Detection Scheme for Wireless IoT Networks.
28. Hybrid NOMA-TDMA for Multiple Access Channels with Non-Ideal Batteries and Circuit Cost.
29. A Secure Contained Testbed for Analyzing IoT Botnets.
30. Network Dimensioning, QoE Maximization, and Power Control for Multi-Tier Machine-Type Communications.
31. Sentinel based malicious relay detection in wireless IoT networks.
32. Hybrid NOMA for an Energy Harvesting MAC With Non-Ideal Batteries and Circuit Power.
33. Machine learning-based early detection of IoT botnets using network-edge traffic.
34. Superposition Coding for Energy Harvesting Communication without CSIT.
35. Network Dimensioning and Radio Resource Management for Multi-Tier Machine-Type Communications.
36. Constant envelope transmission in MISO system with adaptive online constellation.
37. Full-Duplex SIMO Relaying for Machine-Type Communications in Cellular Networks.
38. Detecting Cluster Head Attacks in Heterogeneous Wireless Sensor Networks.
39. Iterative Learning Control based Digital Pre-distortion for Mitigating Impairments in MIMO Wireless Transmitters
40. Constant Envelope Precoding for MIMO Systems.
41. Full-Duplex Relaying in Machine-Type Communications With a Multi-Antenna Base Station.
42. Dynamic Attack-Resilient Routing in Software Defined Networks.
43. Cost-Aware Renewable Energy Management With Application in Cellular Networks.
44. Energy Harvesting Communications Without Transmitter Channel State Information Using Layered Coding.
45. Online Demand Response Strategies for Non-Deferrable Loads With Renewable Energy.
46. Machine Learning-Based Early Detection of IoT Botnets Using Network-Edge Traffic.
47. Throughput Maximization for Mobile Relaying Systems.
48. Receive beamforming optimization for MIMO system with constant envelope precoding.
49. Distortion minimization in energy harvesting sensor nodes with compression power constraints.
50. Fragmentation-Based Multipath Routing for Attack Resilience in Software Defined Networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.