Name
Papers
Collaborators
TRAPPE, WADE
169
203
Citations 
PageRank 
Referers 
3814
236.68
6585
Referees 
References 
1986
1541
Search Limit
1001000
Title
Citations
PageRank
Year
Drug-Resistant Cancer Treatment Strategies Based on the Dynamics of Clonal Evolution and PKPD Modeling of Drug Combinations00.342022
A MULTIPLE ACCESS CHANNEL GAME USING LATENCY METRIC00.342021
A Multi-Jammer Power Control Game10.372021
A Multi-Jammer Game With Latency as the User’s Communication Utility10.372020
A Prospect Theoretic Extension of a Non-Zero-Sum Stochastic Eavesdropping and Jamming Game00.342020
A Jamming Game With Rival-Type Uncertainty20.382020
A Dilemma In The Communication Of A Uav With Its Controller00.342020
Proportional Fair Information Freshness Under Jamming00.342019
SC2 CIL: Evaluating the Spectrum Voxel Announcement Benefits10.382019
Bandwidth Scanning when the Rivals Are Subjective.00.342019
Maxmin Strategy for a Dual Radar and Communication OFDM Waveforms System Facing Uncertainty About the Background Noise.00.342018
To Communicate or to Scan - Prospect Theory Extension of a Stochastic Game.00.342018
A dual radar and communication system facing uncertainty about a jammer’s capability00.342018
Stability of fair trade-off solution between radar and communication objectives on hostile interference00.342018
Secret-Focus: A Practical Physical Layer Secret Communication System by Perturbing Focused Phases in Distributed Beamforming.10.492018
Signal Processing for Smart Vehicle Technologies: Part 2 [From the Guest Editors].00.342017
A Reinforcement Protection Game in the Internet of Things.00.342017
An OFDM-based dual radar/communication system facing uncertain jamming power.00.342017
Impact of Uncertainty About a User to be Active on OFDM Transmission Strategies.00.342017
Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities.10.362017
Bargaining in a Dual Radar and Communication System Using Radar-Prioritized OFDM Waveforms.00.342017
Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies.00.342017
Auto++: Detecting Cars Using Embedded Microphones in Real-Time.30.482017
Equilibrium strategies for an OFDM network that might be under a jamming attack10.362017
Fair Channel Sharing by Wi-Fi and LTE-U Networks with Equal Priority.10.352016
An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm.00.342016
A practical wireless reciprocity-aware key establishment protocol.00.342016
A Feature Article Cluster on Brain Signal Analytics: Analytical Approaches to Enhanced Understanding of Brain Function From the Editors.00.342016
Overlay tunneling as a policy tool for defending mobile ad hoc networks.00.342016
A Secrecy and Security Dilemma in OFDM Communications.00.342016
Bo-ear: unsupervised car sound sensing and tracking using microphones on smartphones.00.342016
Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary's Attack Type is Unknown.100.522016
Optimum Design for Coexistence Between Matrix Completion Based MIMO Radars and a MIMO Communication System.230.742015
Jammer forensics: Localization in peer to peer networks based on Q-learning20.362015
Radar Precoding For Spectrum Sharing Between Matrix Completion Based Mimo Radars And A Mimo Communication System20.382015
Spectrum Scanning When The Intruder Might Have Knowledge About The Scanner'S Capabilities00.342015
One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious90.532015
Introduction to the Issue on Signal and Information Processing for Privacy00.342015
Coordinated dynamic spectrum management of LTE-U and Wi-Fi networks241.552015
Low-Energy Security: Limits and Opportunities in the Internet of Things471.772015
A policy-driven approach to access control in future internet name resolution services10.372014
Distance-Aware Overlay Routing with AODV in Large Scale Ad Hoc Networks00.342014
To Eavesdrop or Jam, That is the Question.40.422013
Stationary Equilibrium Strategies for Bandwidth Scanning.100.932013
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks441.522013
Equivalent Tapped Delay Line Channel Responses with Reduced Taps00.342013
On the Vulnerabilities of CSI in MIMO Wireless Communication Systems120.792012
Detecting anomalous spectrum usage in dynamic spectrum access networks70.502012
Predicting MIMO Performance in Urban Microcells Using Ray Tracing to Characterize the Channel10.352012
An efficient security framework for mobile WiMAX00.342012
  • 1
  • 2