Picture for Shahid Mehraj Shah

Shahid Mehraj Shah

Achievable Sum-rate of variants of QAM over Gaussian Multiple Access Channel with and without security

Add code
Aug 22, 2023
Viaarxiv icon

Unsupervised Ensemble Based Deep Learning Approach for Attack Detection in IoT Network

Add code
Jul 16, 2022
Figure 1 for Unsupervised Ensemble Based Deep Learning Approach for Attack Detection in IoT Network
Figure 2 for Unsupervised Ensemble Based Deep Learning Approach for Attack Detection in IoT Network
Figure 3 for Unsupervised Ensemble Based Deep Learning Approach for Attack Detection in IoT Network
Figure 4 for Unsupervised Ensemble Based Deep Learning Approach for Attack Detection in IoT Network
Viaarxiv icon

Resource Allocation in a MAC with and without security via Game Theoretic Learning

Add code
Jul 05, 2016
Figure 1 for Resource Allocation in a MAC with and without security via Game Theoretic Learning
Figure 2 for Resource Allocation in a MAC with and without security via Game Theoretic Learning
Figure 3 for Resource Allocation in a MAC with and without security via Game Theoretic Learning
Figure 4 for Resource Allocation in a MAC with and without security via Game Theoretic Learning
Viaarxiv icon