2021 journal article
Dynamic Interference Management for UAV-Assisted Wireless Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 21(4), 2637–2653.
2021 journal article
Multi-Hop Task Offloading With On-the-Fly Computation for Multi-UAV Remote Edge Computing
IEEE TRANSACTIONS ON COMMUNICATIONS, 70(2), 1332–1344.
2020 article
Joint Power and Deployment Optimization for Multi-UAV Remote Edge Computing
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).
2020 journal article
Minimizing the Age of Information in the Presence of Location Privacy-Aware Mobile Agents
IEEE TRANSACTIONS ON COMMUNICATIONS, 69(2), 1053–1067.
2020 journal article
Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(6), 4054–4066.
2019 journal article
On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 14(12), 3273–3286.
2019 journal article
Peace: Privacy-Preserving and Cost-Efficient Task Offloading for Mobile-Edge Computing
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(3), 1814–1824.
2018 book
Advances in Mechanics of Microstructured Media and Structures
In ADVANCES IN MECHANICS OF MICROSTRUCTURED MEDIA AND STRUCTURES (Vol. 87, pp. 1–369).
2018 book
Adversary Detection For Cognitive Radio Networks
In SpringerBriefs in Electrical and Computer Engineering.
2018 article
Adversary Detection For Cognitive Radio Networks Conclusion and FutureWork
ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 73–74.
2018 article
Adversary Detection For Cognitive Radio Networks Introduction
ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 1–6.
2018 journal article
Camouflaging Mobile Primary Users in Database-Driven Cognitive Radio Networks
IEEE WIRELESS COMMUNICATIONS LETTERS, 8(1), 21–24.
2018 article
Case Study I: Link Signature Assisted PUE Attack Detection
ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 45–50.
2018 article
Case Study II: HMM-Based Byzantine Attack Detection
ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 51–62.
2018 article
Case Study III: CFC-Based Byzantine Attack Detection
ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 63–72.
2018 journal article
Collaborative IDS Configuration: A Two-Layer Game-Theoretic Approach
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 4(4), 803–815.
2018 journal article
Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT
IEEE INTERNET OF THINGS JOURNAL, 6(3), 4547–4555.
2018 book
Dynamic Games for Network Security
In SpringerBriefs in Electrical and Computer Engineering (pp. 1–74).
2018 article
Dynamic Games for Network Security Conclusion and Future Work
DYNAMIC GAMES FOR NETWORK SECURITY, pp. 73–74.
2018 article
Dynamic Security Games with Deception
DYNAMIC GAMES FOR NETWORK SECURITY, pp. 61–71.
2018 article
Dynamic Security Games with Extra Information
DYNAMIC GAMES FOR NETWORK SECURITY, pp. 25–42.
2018 article
Dynamic Security Games with Incomplete Information
DYNAMIC GAMES FOR NETWORK SECURITY, pp. 43–60.
2018 article
Overview of Adversary Detection in CR Networks
ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 19–44.
2018 article
Overview of Dynamic Network Security Games
DYNAMIC GAMES FOR NETWORK SECURITY, pp. 17–23.
2018 article
Preliminaries
DYNAMIC GAMES FOR NETWORK SECURITY, pp. 1–16.
2018 article
Preliminaries of Analytical Tools
ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 7–17.
2017 journal article
A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(3), 615–627.
2016 conference paper
A A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks
IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications.
2016 conference paper
Collaborative IDS configuration: A two-layer game-theoretical approach
2016 ieee global communications conference (globecom).
2016 journal article
Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 64(13), 3429–3443.
2015 conference paper
A A stochastic multi-channel spectrum access game with incomplete information
2015 ieee international conference on communications (icc), 4799–4804.
2015 article
Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).
2015 conference paper
Improving learning and adaptation in security games by exploiting information asymmetry
2015 ieee conference on computer communications (infocom).
2015 conference paper
No time to demodulate - fast physical layer verification of friendly jamming
2015 ieee military communications conference (milcom 2015), 653–658.
2015 journal article
Toward Proper Guard Zones for Link Signature
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 15(3), 2104–2117.
2014 journal article
Dynamic Adaptive Anti-Jamming via Controlled Mobility
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 13(8), 4374–4388.
2013 journal article
A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 12(5), 2512–2523.
2013 article
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 174–188.
2013 conference paper
Dynamic adaptive anti-jamming via controlled mobility
2013 IEEE Conference on Communications and Network Security (CNS), 1–9.
2013 conference paper
Is link signature dependable for wireless security?
2013 proceedings ieee infocom, 200–204.
2012 conference paper
A Byzantine attack defender: The Conditional Frequency Check
2012 ieee international symposium on information theory proceedings (isit).
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.