


default search action
28th ICT 2021: London, UK
- 28th International Conference on Telecommunications, ICT 2021, London, United Kingdom, June 1-3, 2021. IEEE 2021, ISBN 978-1-6654-1376-3

- Geili T. A. El Sanousi

, Franz Hirtenfelder, Mohammed A. H. Abbas, Raed A. Abd-Alhameed, Xin-She Yang, Tuan Anh Le, Huan Xuan Nguyen:
The Peculiar Case of the Concentric Circular Hexagonal-Star Array: Design and Features. 1-6 - Ayes Chinmay

, Hemanta Kumar Pati:
VoWiFi Cell Capacity Estimation using IEEE 802.11ax. 1-4 - Degang Sun, Sixue Lu, Wen Wang:

CAAE: A Novel Wireless Spectrum Anomaly Detection Method with Multiple Scoring Criterion. 1-5 - Nahid Eddermoug

, Abdeljebar Mansour, Mohamed Sadik
, Essaid Sabir
, Mohamed Azmi:
Klm-based Profiling and Preventing Security Attacks for Cloud Computing: A Comparative Study. 1-6 - Teng Wu, Xiaochang Fan, Jie Zeng, Wei Ni, Ren Ping Liu:

Enabling URLLC under $\kappa-\mu$ Shadowed Fading. 1-6 - Lin Wang

, Chen Li, Bibo Tu:
Evalt: Authenticate Implicitly Before Attacks. 1-7 - Alvaro Javier Ortega:

Transforming the fully-connected structures of hybrid precoders into dynamic partially-connected structures. 1-6 - Christos Bouras, Apostolos Gkamas

, Spyridon Aniceto Katsampiris Salgado, Nikolaos Papachristos:
Spreading Factor Selection Mechanism for Transmission over LoRa Networks. 1-5 - Ahmed Abdel Ghany, Bernard Uguen, Christophe Moy, Dominique Lemur:

On Superior Reliability of Effective Signal Power versus RSSI in LoRaWAN. 1-5 - Pengcheng Liu, Zhen Han, Zhixin Shi, Meichen Liu:

Recognition of Overlapped Frequency Hopping Signals Based on Fully Convolutional Networks. 1-5 - Mohammed M. Alammar, Miguel López-Benítez

:
A Minesweeper Algorithm for Improved Signal Area Estimation in Spectrum Aware Systems. 1-6 - Wei Xia, Mingxin Cui, Wei Wang, Yangyang Guan, Zhenzhen Li, Zhen Li, Gang Xiong

:
Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild. 1-5 - Gaurav Varshney, Naman Shah:

A DNS Security Policy for Timely Detection of Malicious Modification on Webpages. 1-5 - Pedro Prior, Nuno Cota

:
Railways Communications Propagation Prediction over Irregular Terrain using Longley-Rice Model. 1-5 - Shaoying Guo, Yanyun Xu, Weiqing Huang, Bo Liu:

Specific Emitter Identification via Variational Mode Decomposition and Histogram of Oriented Gradient. 1-6 - Ji Huan, Yongzheng Zhang, Peng Chang, Yupeng Tuo:

Detecting Unknown DGAs Using Distances Between Feature Vectors of Domain Names. 1-7 - Amine Faid

, Mohamed Sadik
, Essaid Sabir
:
EACA: An Energy Aware Clustering Algorithm for Wireless IoT Sensors. 1-6 - Kashif Mehmood, H. V. Kalpanie Mendis, Katina Kralevska

, Poul E. Heegaard:
Intent-based Network Management and Orchestration for Smart Distribution Grids. 1-6 - Amina Girdher

, Ankur Bansal, Ankit Dubey:
Analyzing SLIPT for DF Based Mixed FSO-RF Communication System. 1-7 - Vaibhav Kumar

, Mark F. Flanagan, Daniel Benevides da Costa
, Le-Nam Tran
:
On the Secrecy Rate of Downlink NOMA in Underlay Spectrum Sharing with Imperfect CSI: Invited Paper. 167-173 - Jun Wang, Ayham Al-Banna:

Modelling and Analysis of FDX cable Systems. 1-7 - Leila Mounsif, Damien Roque:

Near-Optimal Pulse Design for Pilot-Aided Timing Estimation in Faster-than-Nyquist Systems. 1-5 - Zekun Hong

, Yanyun Xu:
A Novel Weak Signal Detector Based on Power Spectrum Entropy Under Low SNR. 1-6 - Zhijie Feng, Qingqing Liu, Jin Xu, Weihua Liu, Zhe Zhang, Xueyan Chen, Hanqing Ding:

Optimization of non-binary LDPC coded massive MIMO systems with partial mapping and EP detection. 1-6 - Dali Zhu, Hongju Sun, Di Wu:

Fusion of Wireless Signal and Computer Vision for Identification and Tracking. 1-7 - Zhan Wang, Mahsa Derakhshani, Robert M. Edwards:

Dynamic RFID Anti-collision Algorithm with Multiple Interrogators. 1-5 - Yasser Naguib Ahmed:

Large System Analysis of Reflecting Intelligent Surface Aided MIMO systems with Imperfect Channel State Information. 1-5 - Yanyun Xu, Zekun Hong

:
A CEEMDAN-CA Detector for UWB Pulse Signal in Low SNR. 1-6 - Kaja Fjørtoft Ystgaard, Katrien De Moor

:
Bring the human to the network: 5G and beyond. 1-7 - Hao Wang, Shunliang Zhang, Qian Cheng:

Security Aware Resource Allocation for D2D Communications with cooperative Jamming. 1-6 - Feiwen Li, Shunliang Zhang:

Secure transmission in cooperative wireless networks: A two-level coalitional game approach. 1-6 - Bassant Tolba

, Ahmed H. Abd El-Malek
, Mohammed Abo-Zahhad, Maha Elsabrouty:
A Meta Learner Autoencoder for Channel State Information Feedback in Massive MIMO Systems. 1-5 - Beste Atan, Nurullah Çalik

, Semiha Tedik Basaran, Mehmet Basaran, Lutfiye Durak-Ata:
Learning-Based Fast Decision for Task Execution in Next Generation Wireless Networks. 1-5 - Yuankun Wang, Weiqing Huang, Qiaoyu Zhang

, Dong Wei:
A Fast Identification Method of Shortwave Radio Stations Based on Sparse Component Analysis. 1-6 - José Costa-Requena, Chartsias Panteleimon Konstantinos, Dimitrios Kritharidis, Abraham Afriyie, Nicola Carapellese, Eduardo Yusta Padilla:

SDN-enabled terahertz x-haul network. 1-5 - Olfa Ben Yahia, Eylem Erdogan

, Gunes Karabulut-Kurt, Ibrahim Altunbas
, Halim Yanikomeroglu
:
Physical Layer Security Framework for Optical Non-Terrestrial Networks. 162-166

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














