Showing results 19 to 38 of 182
< previous
next >
Issue Date | Title | Author(s) |
2020-05-20 | "Borrowing Arrows with Thatched Boats": The Art of Defeating Reactive
Jammers in IoT Networks | Hoang, DT; Nguyen, DN; Alsheikh, MA; Gong, S; Dutkiewicz, E; Niyato, D; Han, Z |
2013-07-01 | Clustering and power management for virtual MIMO communications in wireless sensor networks | Krunz, M; Siam, MZ; Nguyen, DN |
2020-03-01 | Cognitive Networks with In-Band Full-Duplex Radios: Jamming Attacks and Countermeasures | Hanawal, MK; Nguyen, DN; Krunz, M |
2024-01-01 | Collaborative Learning for Cyberattack Detection in Blockchain Networks | Khoa, TV; Son, DH; Hoang, DT; Trung, NL; Quynh, TTT; Nguyen, DN; Ha, NV; Dutkiewicz, E |
2021 | Common Agency-Based Economic Model for Energy Contract in Electric Vehicle Networks | Saputra, YM; Nguyen, DN; Hoang, DT; Dutkiewicz, E; Mueck, MD |
2023-01-01 | Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems | Dinh, PV; Nguyen, QU; Hoang, DT; Nguyen, DN; Bao, SP; Dutkiewicz, E |
2011-09-20 | A cooperative clustering protocol for energy constrained networks | Nguyen, DN; Krunz, M |
2022-01-01 | Cooperative Friendly Jamming in Swarm UAV-assisted Communications with Wireless Energy Harvesting | Dang-Ngoc, H; Nguyen, DN; Hoang, DT; Ho-Van, K; Dutkiewicz, E |
2014-01-01 | A cooperative MIMO framework for wireless sensor networks | Nguyen, DN; Krunz, M |
2013-08-20 | Cooperative MIMO in wireless networks: Recent developments and challenges | Nguyen, DN; Krunz, M |
2024-01-01 | Countering Eavesdroppers with Meta-learning-based Cooperative Ambient Backscatter Communications | Chu, NH; Van Huynh, N; Nguyen, DN; Hoang, DT; Gong, S; Shu, T; Dutkiewicz, E; Phan, KT |
2022-04-19 | Deep Generative Learning Models for Cloud Intrusion Detection Systems. | Vu, L; Nguyen, QU; Nguyen, DN; Hoang, DT; Dutkiewicz, E |
2018-07-25 | Deep Learning Network Based Spectrum Sensing Methods for OFDM Systems | Cheng, Q; Shi, Z; Nguyen, DN; Dutkiewicz, E |
2020 | Deep Transfer Learning for IoT Attack Detection | Vu, L; Nguyen, QU; Nguyen, DN; Hoang, DT; Dutkiewicz, E |
2022-01-01 | Deep Transfer Learning: A Novel Collaborative Learning Model for Cyberattack Detection Systems in IoT Networks | Khoa, TV; Hoang, DT; Trung, NL; Nguyen, CT; Quynh, TTT; Nguyen, DN; Ha, NV; Dutkiewicz, E |
2020-05-13 | DeepFake: Deep Dueling-based Deception Strategy to Defeat Reactive Jammers | Huynh, NV; Hoang, DT; Nguyen, DN; Dutkiewicz, E |
2021-01-01 | DeepFake: Deep Dueling-based Deception Strategy to Defeat Reactive Jammers | Van Huynh, N; Hoang, DT; Nguyen, DN; Dutkiewicz, E |
2023-01-01 | Defeating Eavesdroppers with Ambient Backscatter Communications | Huynh, NV; Quang Hieu, N; Chu, NH; Nguyen, DN; Hoang, DT; Dutkiewicz, E |
2021-06-01 | Defeating Reactive Jammers with Deep Dueling-based Deception Mechanism | Van Huynh, N; Nguyen, DN; Hoang, DT; Dutkiewicz, E |
2021-05-04 | Defeating Super-Reactive Jammers With Deception Strategy: Modeling, Signal Detection, and Performance Analysis | Van Huynh, N; Nguyen, DN; Hoang, DT; Vu, TX; Dutkiewicz, E; Chatzinotas, S |