Poonam Jindal
According to our database1,
Poonam Jindal
authored at least 20 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks.
J. Supercomput., January, 2024
Int. J. Wirel. Mob. Comput., 2024
Multi-agent Q-learning algorithm-based relay and jammer selection for physical layer security improvement.
Int. J. Wirel. Mob. Comput., 2024
A Fast and Efficient 191-bit Elliptic Curve Cryptographic Processor Using a Hybrid Karatsuba Multiplier for IoT Applications.
IEEE Access, 2024
2022
Machine Learning Approach for SPR based Photonic Crystal Fiber Sensor for Breast Cancer Cells Detection.
Proceedings of the 7th IEEE Forum on Research and Technologies for Society and Industry Innovation, 2022
2021
Intelligent Physical Layer Secure Relay Selection for Wireless Cooperative Networks with Multiple Eavesdroppers.
Wirel. Pers. Commun., 2021
Machine learning-based physical layer security: techniques, open challenges, and applications.
Wirel. Networks, 2021
Design and Implementation of RS(450, 406) Decoder: Forward Error Correction by Reed Solomon Decoding.
Int. J. Embed. Real Time Commun. Syst., 2021
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021
2020
Wirel. Pers. Commun., 2020
2019
Wirel. Pers. Commun., 2019
2017
Wirel. Pers. Commun., 2017
J. Netw. Syst. Manag., 2017
J. King Saud Univ. Comput. Inf. Sci., 2017
Physical Layer Security with Energy Harvesting in Single Hop Wireless Relaying System.
Proceedings of the Information Science and Applications 2017, 2017
Energy Efficiency and Secure Communication with Power Splitting Energy Harvesting Technique for Single Relay Network.
Proceedings of the International Conference on Computer and Applications, 2017
2015
Wirel. Pers. Commun., 2015
2012
Study And Performance Evaluation Of Security-Throughput Tradeoff With Link Adaptive Encryption Scheme
CoRR, 2012