Neural Decoding of Synergy-Based Hand Movements Using Electroencephalography. | 0 | 0.34 | 2019 |
Spectrum Management over Dynamic Spectrum Access based HetNets | 0 | 0.34 | 2019 |
Decoding Asynchronous Reaching in Electroencephalography Using Stacked Autoencoders. | 2 | 0.35 | 2018 |
Joint Spectrum and Energy Efficiency in Device to Device Communication Enabled Wireless Networks. | 1 | 0.35 | 2017 |
Biometrics Based on Hand Synergies and Their Neural Representations. | 2 | 0.37 | 2017 |
Software defined access for HetNets. | 8 | 0.52 | 2016 |
A Micro-Finance Model for Spectrum Management in Wireless Networks. | 2 | 0.41 | 2016 |
Complexity Analysis of CSMA Scheduling via Dependencies Matrix | 0 | 0.34 | 2015 |
Spatio-Temporal Analysis of Passive Consumption in Internet Media | 1 | 0.35 | 2015 |
Reciprocity, fairness and learning in medium access control games. | 1 | 0.35 | 2014 |
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities. | 4 | 0.40 | 2014 |
A Quantitative Model and Analysis of Information Confusion in Social Networks | 3 | 0.39 | 2013 |
Altruism in social networks: good guys do finish first. | 3 | 0.39 | 2013 |
Power Control Game in Multi-Terminal Covert Timing Channels. | 1 | 0.37 | 2012 |
Network measurement based modeling and optimization for IP geolocation | 18 | 0.69 | 2012 |
Measuring and quantifying the silent majority on the Internet | 4 | 0.44 | 2012 |
Cost of Collaboration vs Individual Effort in Social Networks. | 0 | 0.34 | 2011 |
Is Channel Fragmentation/bonding in IEEE 802.22 Networks Secure? | 7 | 0.61 | 2011 |
Security Vulnerability due to Channel Aggregation/Bonding in LTE and HSPA plus Networks | 1 | 0.36 | 2011 |
Estimation of missing RTTs in computer networks: Matrix completion vs compressed sensing | 1 | 0.36 | 2011 |
Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities | 12 | 1.16 | 2010 |
Cross-Layer MAC Enabling Virtual Link for Multi-Hop Routing in Wireless Ad Hoc Networks | 2 | 0.38 | 2010 |
A novel portfolio optimization method for foreign currency investment | 0 | 0.34 | 2009 |
User strategy learning when pricing a RED buffer | 0 | 0.34 | 2009 |
Guest editorial: special issue on cognitive radio oriented wireless networks and communications | 3 | 0.37 | 2008 |
Blind source separation for steganalytic secret message estimation | 1 | 0.36 | 2007 |
Decentralized Learning For Pricing A Red Buffer | 0 | 0.34 | 2007 |
Steganalysis of GIM-based data hiding using kernel density estimation | 10 | 0.74 | 2007 |
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences | 3 | 0.45 | 2007 |
A Sequential Distinguisher for Covert Channel Identification | 0 | 0.34 | 2007 |
Priority Based Dynamic Spectrum Access With Qos And Interference Temperature Constraints | 7 | 2.41 | 2006 |
Learning through Multimedia Interaction | 2 | 0.39 | 2006 |
A Bayesian image steganalysis approach to estimate the embedded secret message | 2 | 0.43 | 2005 |
Analysis and performance evaluation of a fair channel access protocol for open spectrum wireless networks. | 3 | 0.52 | 2005 |
Robust encryption for secure image transmission over wireless channels | 9 | 0.67 | 2005 |
On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis | 0 | 0.34 | 2005 |
Studying Energy Trade Offs in Offloading Computation/Compilation in Java-Enabled Mobile Devices | 37 | 2.04 | 2004 |
On Information Hiding With Incomplete Information About Steganalysis | 3 | 0.73 | 2004 |
Current trends in steganalysis: a critical survey | 15 | 1.03 | 2004 |
Web Search Steganalysis: Some Challenges And Approaches | 6 | 0.60 | 2004 |
Distributed discrete power control for bursty transmissions over wireless data networks | 17 | 3.65 | 2004 |
On the complexity and hardness of the steganography embedding problem | 1 | 0.37 | 2004 |
Locally most-powerful detector for secret key estimation in spread spectrum image steganography | 1 | 0.38 | 2004 |
An adaptive energy-efficient link layer protocol using stochastic learning control | 11 | 3.36 | 2003 |
A mathematical framework for active steganalysis | 20 | 1.36 | 2003 |
Waterfilling: a connection between information theoretic and perceptually based watermarking | 1 | 0.37 | 2002 |
Adaptive steganography. | 0 | 0.34 | 2002 |
Mathematical approach to steganalysis | 5 | 0.50 | 2002 |
Power efficient adaptive M-QAM design using adaptive pipelined analog-to-digital converter. | 0 | 0.34 | 2002 |
Average power in digital CMOS circuits using least square estimation | 2 | 0.39 | 2001 |