Shamik Sengupta

Orcid: 0000-0002-2019-8056

Affiliations:
  • University of Nevada, Reno, USA


According to our database1, Shamik Sengupta authored at least 175 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Feature Selection Using the Advanced Shapley Value.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

FlexHash - Hybrid Locality Sensitive Hashing for IoT Device Identification.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

Game Theory for Privacy-Preserving Cybersecurity Information Exchange Framework.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

Introduction to Quantum Systems and Security Vulnerabilities.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
An Intelligent Privacy Preservation Scheme for EV Charging Infrastructure.
IEEE Trans. Ind. Informatics, 2023

What Could Possibly Go Wrong? Identification of Current Challenges and Prospective Opportunities for Anomaly Detection in Internet of Things.
IEEE Netw., 2023

Give and Take: Federated Transfer Learning for Industrial IoT Network Intrusion Detection.
CoRR, 2023

Digital Twins for Moving Target Defense Validation in AC Microgrids.
CoRR, 2023

Improvise, Adapt, Overcome: Dynamic Resiliency Against Unknown Attack Vectors in Microgrid Cybersecurity Games.
CoRR, 2023

Lost at Sea: Assessment and Evaluation of Rootkit Attacks on Shipboard Microgrids.
CoRR, 2023

Runs in the Family: Malware Family Variants Identification through API Sequence and Frequency Analysis.
Proceedings of the International Conference on Multimedia Computing, 2023

Locality Sensitive Hashing for Network Traffic Fingerprinting.
Proceedings of the 29th IEEE International Symposium on Local and Metropolitan Area Networks, 2023

Less is More: Deep Learning Framework for Digital Forensics in Resource-Constrained Environments.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

CarVer: Setting the Standard for Face Verification with Caricatures.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Eyes on the Road: A Survey on Cyber Attacks and Defense Solutions for Vehicular Ad-Hoc Networks.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

UNR-IDD: Intrusion Detection Dataset using Network Port Statistics.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
A novel machine learning pipeline to detect malicious anomalies for the Internet of Things.
Internet Things, 2022

Modeling and analyzing attacker behavior in IoT botnet using temporal convolution network (TCN).
Comput. Secur., 2022

Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective.
IEEE Access, 2022

A Game Theoretical Vulnerability Analysis of Adversarial Attack.
Proceedings of the Advances in Visual Computing - 17th International Symposium, 2022

NetDefense: A Tower Defense Cybersecurity Game for Middle and High School Students.
Proceedings of the IEEE Frontiers in Education Conference, 2022

Flood Control: TCP-SYN Flood Detection for Software-Defined Networks using OpenFlow Port Statistics.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Smart Recon: Network Traffic Fingerprinting for IoT Device Identification.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Analysis and Prevention of Security Vulnerabilities in a Smart City.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Ohana Means Family: Malware Family Classification using Extreme Learning Machines.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Blockchain-Enabled Intelligent Vehicular Edge Computing.
IEEE Netw., 2021

A scalable blockchain based trust management in VANET routing protocol.
J. Parallel Distributed Comput., 2021

Towards secure and practical consensus for blockchain based VANET.
Inf. Sci., 2021

ALICIA: Applied Intelligence in blockchain based VANET: Accident Validation as a Case Study.
Inf. Process. Manag., 2021

Erratum to "COP: An integrated Communication, Optimization, and Prediction unit for smart Plug-in Electric Vehicle Charging" [Internet of Things, volume 9, March 2020, 100148].
Internet Things, 2021

Semi-supervised Conditional GAN for Simultaneous Generation and Detection of Phishing URLs: A Game theoretic Perspective.
CoRR, 2021

Cybersecurity Information Exchange with Privacy (CYBEX-P) and TAHOE - A Cyberthreat Language.
CoRR, 2021

Deep Ensemble Learning-based Approach to Real-time Power System State Estimation.
CoRR, 2021

Reputation-Based Miner Node Selection in Blockchain-Based Vehicular Edge Computing.
IEEE Consumer Electron. Mag., 2021

Context-Aware Fine-Grained Task Scheduling at Vehicular Edges: An Extreme Reinforcement Learning based Dynamic Approach.
Proceedings of the 22nd IEEE International Symposium on a World of Wireless, 2021

Deep-learning assisted Cross-Layer Routing in Multi-hop Wireless Network.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

Imposters Among Us: A Supervised Learning Approach to Anomaly Detection in IoT Sensor Data.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

Casting a Wide Net: An Internet of Things Testbed for Cybersecurity Education and Research.
Proceedings of the 2021 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2021

The Devil is in the Details: Confident & Explainable Anomaly Detector for Software-Defined Networks.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

Sharing is Caring: Optimized Threat Visualization for a Cybersecurity Data Sharing Platform.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

Personalized Privacy Preservation for Smart Grid.
Proceedings of the IEEE International Smart Cities Conference, 2021

Analysis of Attacker Behavior in Compromised Hosts During Command and Control.
Proceedings of the ICC 2021, 2021

Friend or Foe: Discerning Benign vs Malicious Software and Malware Family.
Proceedings of the IEEE Global Communications Conference, 2021

Correlation of Cyber Threat Intelligence Data Across Global Honeypots.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Scalable and Robust Outlier Detector using Hierarchical Clustering and Long Short-Term Memory (LSTM) Neural Network for the Internet of Things.
Internet Things, 2020

COP: An integrated Communication, Optimization, and Prediction unit for smart Plug-in Electric Vehicle Charging.
Internet Things, 2020

Vulnerability market as a public-good auction with privacy preservation.
Comput. Secur., 2020

Optimal UAV Positioning for a Temporary Network Using an Iterative Genetic Algorithm.
Proceedings of the 29th Wireless and Optical Communications Conference, 2020

Low-cost wireless testbed for Internet of Things ad hoc networks prototyping and evaluation.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Cybersecurity analysis in Dedicated Short-Range Communications in vehicular networks.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

A survey on Classification of Cyber-attacks on IoT and IIoT devices.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

BITS: Blockchain based Intelligent Transportation System with Outlier Detection for Smart City.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, 2020

Blockchain-based Secure and Reliable Manufacturing System.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Malware Family Fingerprinting Through Behavioral Analysis.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

A Light-weight Blockchain Architecture for V2V Knowledge Sharing at Vehicular Edges.
Proceedings of the IEEE International Smart Cities Conference, 2020

PEBERS: Practical Ethereum Blockchain based Efficient Ride Hailing Service.
Proceedings of the IEEE International Conference on Informatics, 2020

Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Evolving Dynamically Reconfiguring UAV-hosted Mesh Networks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020

An Automated Framework for Real-time Phishing URL Detection.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

Area-Optimized UAV Swarm Network for Search and Rescue Operations.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

BloCyNfo-Share: Blockchain based Cybersecurity Information Sharing with Fine Grained Access Control.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

Game theoretic approach applied in cybersecurity information exchange framework.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
A Coalitional Cyber-Insurance Framework for a Common Platform.
IEEE Trans. Inf. Forensics Secur., 2019

Distributed allocation and dynamic reassignment of channels in UAV networks for wireless coverage.
Pervasive Mob. Comput., 2019

Fair and private rewarding in a coalitional game of cybersecurity information sharing.
IET Inf. Secur., 2019

Dynamic self-reconfiguration of unmanned aerial vehicles to serve overloaded hotspot cells.
Comput. Electr. Eng., 2019

In-band LOS discovery using highly directional transceivers.
Ad Hoc Networks, 2019

Insights into Malware Detection via Behavioral Frequency Analysis Using Machine Learning.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Anomaly Detection using Supervised Learning and Multiple Statistical Methods.
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019

Pooling Approach for Task Allocation in the Blockchain Based Decentralized Storage Network.
Proceedings of the 15th International Conference on Network and Service Management, 2019

Cuckoo's Malware Threat Scoring and Classification: Friend or Foe?
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

Random Forest Twitter Bot Classifier.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

A System Architecture of Cybersecurity Information Exchange with Privacy (CYBEX-P).
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

2018
CR-Honeynet: A Cognitive Radio Learning and Decoy-Based Sustenance Mechanism to Avoid Intelligent Jammer.
IEEE Trans. Cogn. Commun. Netw., 2018

Establishing evolutionary game models for CYBer security information EXchange (CYBEX).
J. Comput. Syst. Sci., 2018

Distributed adaptive beam nulling to survive against jamming in 3D UAV mesh networks.
Comput. Networks, 2018

Unmanned Aerial Vehicles Positioning Scheme for First-Responders in a Dynamic Area of Interest.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Crowdfunding the Insurance of a Cyber-Product Using Blockchain.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Predicting Congestion Level in Wireless Networks Using an Integrated Approach of Supervised and Unsupervised Learning.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Analysis and Detection of Outliers due to Data Falsification Attacks in Vehicular Traffic Prediction Application.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Automated Structured Threat Information Expression (STIX) Document Generation with Privacy Preservation.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Development of Web-based Automated System for Cyber Analytic Applications.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Search and Rescue Operations with Mesh Networked Robots.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Sharing Susceptible Passwords as Cyber Threat Intelligence Feed.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Software-defined network and cloud-edge collaboration for smart and connected vehicles.
Proceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking, 2018

Wi-Fi spectrum usage analytics in University of Nevada, Reno.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018

Software-defined network based resource allocation in distributed servers for unmanned aerial vehicles.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

Smart plug-in electric vehicle charging to reduce electric load variation at a parking place.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

2017
A game-theoretic and stochastic survivability mechanism against induced attacks in Cognitive Radio Networks.
Pervasive Mob. Comput., 2017

Privacy-preserving cybersecurity information exchange mechanism.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017

Attribute based sharing in cybersecurity information exchange framework.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017

Understanding the feasibility of machine learning algorithms in a game theoretic environment for dynamic spectrum access.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017

Dynamic deployment of UAV-enabled floating access points for serving hot zones.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017

A novel software-defined network based approach for charging station allocation to plugged-in electric vehicles.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

3-Way game model for privacy-preserving cybersecurity information exchange framework.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

A coalitional game theory approach for cybersecurity information sharing.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Distributed split-path routing strategy for multi-hop mesh networks.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Implementation of interface agility for duplex dynamic spectrum access radio using USRP.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Enhancing performance and longevity of multi-radio multi-channel hetnets through dynamic path-assignment.
Proceedings of the 2017 International Conference on Computing, 2017

Distributed adaptive beam nulling to mitigate jamming in 3D UAV mesh networks.
Proceedings of the 2017 International Conference on Computing, 2017

Evolving sharing strategies in cybersecurity information exchange framework.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance.
Proceedings of the Game Theory for Networks - 7th International EAI Conference, 2017

2016
Guest Editorial for the Special Issue on Self-Optimizing Cognitive Radio Technologies.
Phys. Commun., 2016

Adaptive beam nulling in multihop ad hoc networks against a jammer in motion.
Comput. Networks, 2016

Implementation of 3D Obstacle Compliant Mobility Models for UAV Networks in ns-3.
Proceedings of the Workshop on ns-3, 2016

LOS discovery in 3D for highly directional transceivers.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

LOS discovery for highly directional full duplex RF/FSO transceivers.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

A device-to-device service sharing middleware for heterogeneous wireless networks.
Proceedings of the IEEE International Symposium on Local and Metropolitan Area Networks, 2016

2015
Performance analysis of CR-honeynet to prevent jamming attack through stochastic modeling.
Pervasive Mob. Comput., 2015

Cognitive Radio Enabled Wireless Sensor Networks and Survivability Challenges.
Int. J. Distributed Sens. Networks, 2015

Distributed and cheat-proof spectrum contention scheme for IEEE 802.22 WRAN networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Heterogeneous access network(s) selection in multi-interface radio devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Enhancement of spectrum utilization in non-contiguous DSA with online defragmentation.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Adaptive Flocking Control of Multiple Unmanned Ground Vehicles by Using a UAV.
Proceedings of the Advances in Visual Computing - 11th International Symposium, 2015

An evolutionary game-theoretic framework for cyber-threat information sharing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Cyber-Investment and Cyber-Information Exchange Decision Modeling.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Performance of Adaptive Beam Nulling in Multihop Ad-Hoc Networks under Jamming.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Game Theoretic Modeling to Enforce Security Information Sharing among Firms.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Evolving defensive strategies against iterated induction attacks in cognitive radio networks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

2014
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities.
IEEE Trans. Veh. Technol., 2014

Price-bandwidth dynamics for WSPs in heterogeneous wireless networks.
Phys. Commun., 2014

CR-Honeynet: A Learning & Decoy Based Sustenance Mechanism against Jamming Attack in CRN.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Stochastic Model for Cognitive Radio Networks under Jamming Attacks and Honeypot-Based Prevention.
Proceedings of the Distributed Computing and Networking - 15th International Conference, 2014

2013
SpiderRadio: A Cognitive Radio Implementation Using IEEE 802.11 Components.
IEEE Trans. Mob. Comput., 2013

Self-coexistence among interference-aware IEEE 802.22 networks with enhanced air-interface.
Pervasive Mob. Comput., 2013

Special issue on advances in 4G wireless and beyond.
EURASIP J. Wirel. Commun. Netw., 2013

Vulnerabilities in cognitive radio networks: A survey.
Comput. Commun., 2013

Open research issues in multi-hop cognitive radio networks.
IEEE Commun. Mag., 2013

Self-Coexistence in Cognitive Radio Networks Using Multi-Stage Perception Learning.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Sustenance against RL-Based Sybil Attacks in Cognitive Radio Networks Using Dynamic Reputation System.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Performance evaluation of RODEO: Route degradation optimization for the multi-hop dynamic spectrum access networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

(Multiple) Channel acquisition and contention handling mechanisms for dynamic spectrum access in a distributed system of cognitive radio networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

2012
Power Control Game in Multi-Terminal Covert Timing Channels.
IEEE J. Sel. Areas Commun., 2012

Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach.
IET Commun., 2012

MAximum SPECTrum packing: a distributed opportunistic channel acquisition mechanism in dynamic spectrum access networks.
IET Commun., 2012

Designing a collector overlay architecture for fault diagnosis in video networks.
Comput. Commun., 2012

2011
Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks.
IEEE J. Sel. Areas Commun., 2011

SpiderRadio: A cognitive radio network with commodity hardware and open source software.
IEEE Commun. Mag., 2011

Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense.
Proceedings of IEEE International Conference on Communications, 2011

Is Channel Fragmentation/bonding in IEEE 802.22 Networks Secure?
Proceedings of IEEE International Conference on Communications, 2011

Human Society Inspired Dynamic Spectrum Access Networks: The Effect of Parochialism.
Proceedings of the Global Communications Conference, 2011

Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks.
Proceedings of the Global Communications Conference, 2011

Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network.
Proceedings of the Global Communications Conference, 2011

2010
A Game Theoretic Framework for Power Control in Wireless Sensor Networks.
IEEE Trans. Computers, 2010

An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks.
Proceedings of IEEE International Conference on Communications, 2010

SpiderRadio: An Incumbent Sensing Implementation for Cognitive Radio Networking Using IEEE 802.11 Devices.
Proceedings of IEEE International Conference on Communications, 2010

Cross-Layer MAC Enabling Virtual Link for Multi-Hop Routing in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2010

Competitive Spectrum Trading in Dynamic Spectrum Access Markets: A Price War.
Proceedings of the Global Communications Conference, 2010

2009
An economic framework for dynamic spectrum access and service pricing.
IEEE/ACM Trans. Netw., 2009

On Adversarial Games in Dynamic Spectrum Access Networking based Covert Timing Channels?
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009

Dynamic pricing for service provisioning and network selection in heterogeneous networks.
Phys. Commun., 2009

Dynamic spectrum access in cognitive radio based tactical networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

A Collector Overlay Architecture for Fault Diagnosis in Access Networks.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Improving Quality of VoIP Streams over WiMax.
IEEE Trans. Computers, 2008

Scheduling for end-to-end performance in multi-rate CDMA/HDR systems.
Phys. Commun., 2008

Designing Auction Mechanisms for Dynamic Spectrum Access.
Mob. Networks Appl., 2008

Resource Management Considerations in Collector Overlay Networks.
Proceedings of the Fourth International Conference on Networking and Services, 2008

A Game Theoretic Framework for Distributed Self-Coexistence Among IEEE 802.22 Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Feedback-based real-time streaming over WiMax.
IEEE Wirel. Commun., 2007

Performance Modeling of Multi-Rate HDR and its Effect on TCP Throughput.
Proceedings of IEEE International Conference on Communications, 2007

Enhancements to Cognitive Radio Based IEEE 802.22 Air-Interface.
Proceedings of IEEE International Conference on Communications, 2007

Sequential and Concurrent Auction Mechanisms for Dynamic Spectrum Access.
Proceedings of the 2nd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2007

Initializing mesh architecture for cognitive radio based IEEE 802.22.
Proceedings of the 2nd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2007

2006
Differential FEC and ARQ for Radio Link Protocols.
IEEE Trans. Computers, 2006

Synchronous and Asynchronous Auction Models for Dynamic Spectrum Access.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

Improving R-Score of VoIP Streams over WiMax.
Proceedings of IEEE International Conference on Communications, 2006

2005
Exploiting MAC Flexibility in WiMAX for Media Streaming.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

WRN: improving system performance in 3G networks through fixed multi-hop relay nodes.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

2004
Distributed Power Control in Sensor Networks: A Game Theoretic Approach.
Proceedings of the Distributed Computing, 2004


  Loading...