Drug-Resistant Cancer Treatment Strategies Based on the Dynamics of Clonal Evolution and PKPD Modeling of Drug Combinations | 0 | 0.34 | 2022 |
A MULTIPLE ACCESS CHANNEL GAME USING LATENCY METRIC | 0 | 0.34 | 2021 |
A Multi-Jammer Power Control Game | 1 | 0.37 | 2021 |
A Multi-Jammer Game With Latency as the User’s Communication Utility | 1 | 0.37 | 2020 |
A Prospect Theoretic Extension of a Non-Zero-Sum Stochastic Eavesdropping and Jamming Game | 0 | 0.34 | 2020 |
A Jamming Game With Rival-Type Uncertainty | 2 | 0.38 | 2020 |
A Dilemma In The Communication Of A Uav With Its Controller | 0 | 0.34 | 2020 |
Proportional Fair Information Freshness Under Jamming | 0 | 0.34 | 2019 |
SC2 CIL: Evaluating the Spectrum Voxel Announcement Benefits | 1 | 0.38 | 2019 |
Bandwidth Scanning when the Rivals Are Subjective. | 0 | 0.34 | 2019 |
Maxmin Strategy for a Dual Radar and Communication OFDM Waveforms System Facing Uncertainty About the Background Noise. | 0 | 0.34 | 2018 |
To Communicate or to Scan - Prospect Theory Extension of a Stochastic Game. | 0 | 0.34 | 2018 |
A dual radar and communication system facing uncertainty about a jammer’s capability | 0 | 0.34 | 2018 |
Stability of fair trade-off solution between radar and communication objectives on hostile interference | 0 | 0.34 | 2018 |
Secret-Focus: A Practical Physical Layer Secret Communication System by Perturbing Focused Phases in Distributed Beamforming. | 1 | 0.49 | 2018 |
Signal Processing for Smart Vehicle Technologies: Part 2 [From the Guest Editors]. | 0 | 0.34 | 2017 |
A Reinforcement Protection Game in the Internet of Things. | 0 | 0.34 | 2017 |
An OFDM-based dual radar/communication system facing uncertain jamming power. | 0 | 0.34 | 2017 |
Impact of Uncertainty About a User to be Active on OFDM Transmission Strategies. | 0 | 0.34 | 2017 |
Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities. | 1 | 0.36 | 2017 |
Bargaining in a Dual Radar and Communication System Using Radar-Prioritized OFDM Waveforms. | 0 | 0.34 | 2017 |
Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies. | 0 | 0.34 | 2017 |
Auto++: Detecting Cars Using Embedded Microphones in Real-Time. | 3 | 0.48 | 2017 |
Equilibrium strategies for an OFDM network that might be under a jamming attack | 1 | 0.36 | 2017 |
Fair Channel Sharing by Wi-Fi and LTE-U Networks with Equal Priority. | 1 | 0.35 | 2016 |
An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm. | 0 | 0.34 | 2016 |
A practical wireless reciprocity-aware key establishment protocol. | 0 | 0.34 | 2016 |
A Feature Article Cluster on Brain Signal Analytics: Analytical Approaches to Enhanced Understanding of Brain Function From the Editors. | 0 | 0.34 | 2016 |
Overlay tunneling as a policy tool for defending mobile ad hoc networks. | 0 | 0.34 | 2016 |
A Secrecy and Security Dilemma in OFDM Communications. | 0 | 0.34 | 2016 |
Bo-ear: unsupervised car sound sensing and tracking using microphones on smartphones. | 0 | 0.34 | 2016 |
Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary's Attack Type is Unknown. | 10 | 0.52 | 2016 |
Optimum Design for Coexistence Between Matrix Completion Based MIMO Radars and a MIMO Communication System. | 23 | 0.74 | 2015 |
Jammer forensics: Localization in peer to peer networks based on Q-learning | 2 | 0.36 | 2015 |
Radar Precoding For Spectrum Sharing Between Matrix Completion Based Mimo Radars And A Mimo Communication System | 2 | 0.38 | 2015 |
Spectrum Scanning When The Intruder Might Have Knowledge About The Scanner'S Capabilities | 0 | 0.34 | 2015 |
One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious | 9 | 0.53 | 2015 |
Introduction to the Issue on Signal and Information Processing for Privacy | 0 | 0.34 | 2015 |
Coordinated dynamic spectrum management of LTE-U and Wi-Fi networks | 24 | 1.55 | 2015 |
Low-Energy Security: Limits and Opportunities in the Internet of Things | 47 | 1.77 | 2015 |
A policy-driven approach to access control in future internet name resolution services | 1 | 0.37 | 2014 |
Distance-Aware Overlay Routing with AODV in Large Scale Ad Hoc Networks | 0 | 0.34 | 2014 |
To Eavesdrop or Jam, That is the Question. | 4 | 0.42 | 2013 |
Stationary Equilibrium Strategies for Bandwidth Scanning. | 10 | 0.93 | 2013 |
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks | 44 | 1.52 | 2013 |
Equivalent Tapped Delay Line Channel Responses with Reduced Taps | 0 | 0.34 | 2013 |
On the Vulnerabilities of CSI in MIMO Wireless Communication Systems | 12 | 0.79 | 2012 |
Detecting anomalous spectrum usage in dynamic spectrum access networks | 7 | 0.50 | 2012 |
Predicting MIMO Performance in Urban Microcells Using Ray Tracing to Characterize the Channel | 1 | 0.35 | 2012 |
An efficient security framework for mobile WiMAX | 0 | 0.34 | 2012 |