39 results on '"Shim, Kyusung"'
Search Results
2. Opportunistic Scheduling Scheme to Improve Physical-Layer Security in Cooperative NOMA System: Performance Analysis and Deep Learning Design
3. A Deep-Learning-Based Secure Routing Protocol to Avoid Blackhole Attacks in VANETs
4. DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output
5. Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks
6. Exploiting Impact of Eavesdropping Attacks on Secrecy Performance in WPT-based Secure Multi-hop Transmission
7. Design and Implementation of Smart IoT Monitoring System using Multi-to-One Visible Light Communication
8. Exploiting Secure Multihop Transmission in Underlying Cognitive Radio Networks: Analysis and Deep Learning Approaches
9. Exploiting TAS schemes to Enhance the PHY-security in Cooperative NOMA Networks: A Deep Learning Approach
10. Deep Learning-based Spectral Efficiency Maximization in Massive MIMO-NOMA Systems with STAR-RIS
11. A Deep Reinforcement Learning-Based QoS Routing Protocol Exploiting Cross-Layer Design in Cognitive Radio Mobile Ad Hoc Networks
12. A Hybrid Price Auction-Based Secure Routing Protocol Using Advanced Speed and Cosine Similarity-Based Clustering against Sinkhole Attack in VANETs
13. Enhancing PHY-Security of FD-Enabled NOMA Systems Using Jamming and User Selection: Performance Analysis and DNN Evaluation
14. A Deep-Neural-Network-Based Relay Selection Scheme in Wireless-Powered Cognitive IoT Networks
15. An Optimal QoS Multicast Routing Protocol in IoT Enabling Cognitive Radio MANETs: A Deep Q-Learning Approach
16. A Machine Learning-based Error Correction and Filtering System for Multicast Visible Light Communications
17. DQR: A Deep Reinforcement Learning-based QoS Routing Protocol in Cognitive Radio Mobile Ad Hoc Networks
18. A New Deep Q-Network Design for QoS Multicast Routing in Cognitive Radio MANETs
19. A location-aware routing protocol with adaptive transmission angle management in mobile overlay cognitive ad hoc networks
20. Secrecy Outage Performance and Deep Learning Evaluation of Multihop Energy Harvesting IoT Networks over Nakagami-m Fading Channels
21. On the Performance of Multihop D2D Communications in Cognitive IoT Networks with Energy Harvesting: A Deep Learning Approach
22. ACORP : An Ant Colony Optimization-based Routing Protocol in Mobile Ad-hoc Networks
23. ACOQMR : ACO-based QoS Mesh Routing Protocol in Mobile Overlay Cognitive Ad-hoc Networks
24. A Game Theory Based Clustering Protocol to Support Multicast Routing in Cognitive Radio Mobile Ad Hoc Networks
25. Exploiting Opportunistic Scheduling Schemes and WPT-Based Multi-Hop Transmissions to Improve Physical Layer Security in Wireless Sensor Networks
26. Two-way LED-to-LED Visible Light Communication System Using Machine Learning
27. Exploiting Opportunistic Scheduling Schemes to Improve Physical-Layer Security in MU-MISO NOMA Systems
28. Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks
29. A Physical Layer Security-Based Transmit Antenna Selection Scheme for NOMA Systems
30. Improving Physical Layer Security of NOMA Networks by Using Opportunistic Scheduling
31. User Requirement based Solar Power Generation Safety Evaluation System
32. Multi-to-One Visible Lighting Communication based IoT System using Rolling Shutter Technique
33. A physical layer security-based routing protocol in mobile ad-hoc wireless networks
34. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks
35. EHER: An Energy Harvesting Aware Entropy-Based Routing Protocol in Mobile Ad-Hoc Wireless Sensor Networks
36. Development of Mobile Cloud Computing Client UI/UX based on Open Source SPICE
37. An Analysis Modeling Architecture for Supporting Physical Layer Security of Wireless Networks under Hardware Impairments
38. The Impact of Hardware Impairments and Imperfect Channel State Information on Physical Layer Security
39. Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.