default search action
28th ICT 2021: London, UK
- 28th International Conference on Telecommunications, ICT 2021, London, United Kingdom, June 1-3, 2021. IEEE 2021, ISBN 978-1-6654-1376-3
- Geili T. A. El Sanousi, Franz Hirtenfelder, Mohammed A. H. Abbas, Raed A. Abd-Alhameed, Xin-She Yang, Tuan Anh Le, Huan Xuan Nguyen:
The Peculiar Case of the Concentric Circular Hexagonal-Star Array: Design and Features. 1-6 - Ayes Chinmay, Hemanta Kumar Pati:
VoWiFi Cell Capacity Estimation using IEEE 802.11ax. 1-4 - Degang Sun, Sixue Lu, Wen Wang:
CAAE: A Novel Wireless Spectrum Anomaly Detection Method with Multiple Scoring Criterion. 1-5 - Nahid Eddermoug, Abdeljebar Mansour, Mohamed Sadik, Essaid Sabir, Mohamed Azmi:
Klm-based Profiling and Preventing Security Attacks for Cloud Computing: A Comparative Study. 1-6 - Teng Wu, Xiaochang Fan, Jie Zeng, Wei Ni, Ren Ping Liu:
Enabling URLLC under $\kappa-\mu$ Shadowed Fading. 1-6 - Lin Wang, Chen Li, Bibo Tu:
Evalt: Authenticate Implicitly Before Attacks. 1-7 - Alvaro Javier Ortega:
Transforming the fully-connected structures of hybrid precoders into dynamic partially-connected structures. 1-6 - Christos Bouras, Apostolos Gkamas, Spyridon Aniceto Katsampiris Salgado, Nikolaos Papachristos:
Spreading Factor Selection Mechanism for Transmission over LoRa Networks. 1-5 - Ahmed Abdel Ghany, Bernard Uguen, Christophe Moy, Dominique Lemur:
On Superior Reliability of Effective Signal Power versus RSSI in LoRaWAN. 1-5 - Pengcheng Liu, Zhen Han, Zhixin Shi, Meichen Liu:
Recognition of Overlapped Frequency Hopping Signals Based on Fully Convolutional Networks. 1-5 - Mohammed M. Alammar, Miguel López-Benítez:
A Minesweeper Algorithm for Improved Signal Area Estimation in Spectrum Aware Systems. 1-6 - Wei Xia, Mingxin Cui, Wei Wang, Yangyang Guan, Zhenzhen Li, Zhen Li, Gang Xiong:
Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild. 1-5 - Gaurav Varshney, Naman Shah:
A DNS Security Policy for Timely Detection of Malicious Modification on Webpages. 1-5 - Pedro Prior, Nuno Cota:
Railways Communications Propagation Prediction over Irregular Terrain using Longley-Rice Model. 1-5 - Shaoying Guo, Yanyun Xu, Weiqing Huang, Bo Liu:
Specific Emitter Identification via Variational Mode Decomposition and Histogram of Oriented Gradient. 1-6 - Ji Huan, Yongzheng Zhang, Peng Chang, Yupeng Tuo:
Detecting Unknown DGAs Using Distances Between Feature Vectors of Domain Names. 1-7 - Amine Faid, Mohamed Sadik, Essaid Sabir:
EACA: An Energy Aware Clustering Algorithm for Wireless IoT Sensors. 1-6 - Kashif Mehmood, H. V. Kalpanie Mendis, Katina Kralevska, Poul E. Heegaard:
Intent-based Network Management and Orchestration for Smart Distribution Grids. 1-6 - Amina Girdher, Ankur Bansal, Ankit Dubey:
Analyzing SLIPT for DF Based Mixed FSO-RF Communication System. 1-7 - Vaibhav Kumar, Mark F. Flanagan, Daniel Benevides da Costa, Le-Nam Tran:
On the Secrecy Rate of Downlink NOMA in Underlay Spectrum Sharing with Imperfect CSI: Invited Paper. 167-173 - Jun Wang, Ayham Al-Banna:
Modelling and Analysis of FDX cable Systems. 1-7 - Leila Mounsif, Damien Roque:
Near-Optimal Pulse Design for Pilot-Aided Timing Estimation in Faster-than-Nyquist Systems. 1-5 - Zekun Hong, Yanyun Xu:
A Novel Weak Signal Detector Based on Power Spectrum Entropy Under Low SNR. 1-6 - Zhijie Feng, Qingqing Liu, Jin Xu, Weihua Liu, Zhe Zhang, Xueyan Chen, Hanqing Ding:
Optimization of non-binary LDPC coded massive MIMO systems with partial mapping and EP detection. 1-6 - Dali Zhu, Hongju Sun, Di Wu:
Fusion of Wireless Signal and Computer Vision for Identification and Tracking. 1-7 - Zhan Wang, Mahsa Derakhshani, Robert M. Edwards:
Dynamic RFID Anti-collision Algorithm with Multiple Interrogators. 1-5 - Yasser Naguib Ahmed:
Large System Analysis of Reflecting Intelligent Surface Aided MIMO systems with Imperfect Channel State Information. 1-5 - Yanyun Xu, Zekun Hong:
A CEEMDAN-CA Detector for UWB Pulse Signal in Low SNR. 1-6 - Kaja Fjørtoft Ystgaard, Katrien De Moor:
Bring the human to the network: 5G and beyond. 1-7 - Hao Wang, Shunliang Zhang, Qian Cheng:
Security Aware Resource Allocation for D2D Communications with cooperative Jamming. 1-6 - Feiwen Li, Shunliang Zhang:
Secure transmission in cooperative wireless networks: A two-level coalitional game approach. 1-6 - Bassant Tolba, Ahmed H. Abd El-Malek, Mohammed Abo-Zahhad, Maha Elsabrouty:
A Meta Learner Autoencoder for Channel State Information Feedback in Massive MIMO Systems. 1-5 - Beste Atan, Nurullah Çalik, Semiha Tedik Basaran, Mehmet Basaran, Lutfiye Durak-Ata:
Learning-Based Fast Decision for Task Execution in Next Generation Wireless Networks. 1-5 - Yuankun Wang, Weiqing Huang, Qiaoyu Zhang, Dong Wei:
A Fast Identification Method of Shortwave Radio Stations Based on Sparse Component Analysis. 1-6 - José Costa-Requena, Chartsias Panteleimon Konstantinos, Dimitrios Kritharidis, Abraham Afriyie, Nicola Carapellese, Eduardo Yusta Padilla:
SDN-enabled terahertz x-haul network. 1-5 - Olfa Ben Yahia, Eylem Erdogan, Gunes Karabulut-Kurt, Ibrahim Altunbas, Halim Yanikomeroglu:
Physical Layer Security Framework for Optical Non-Terrestrial Networks. 162-166
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.