Relaying and radio resource partitioning for machine-type communications in cellular networks U Tefek, TJ Lim IEEE Transactions on Wireless Communications 16 (2), 1344-1356, 2016 | 50 | 2016 |
Interference management through exclusion zones in two-tier cognitive networks U Tefek, TJ Lim IEEE Transactions on Wireless communications 15 (3), 2292-2302, 2015 | 36 | 2015 |
LoMoS: Less-online/more-offline signatures for extremely time-critical systems E Esiner, U Tefek, HSM Erol, D Mashima, B Chen, YC Hu, Z Kalbarczyk, ... IEEE Transactions on Smart Grid 13 (4), 3214-3226, 2022 | 23 | 2022 |
Clustering and radio resource partitioning for machine-type communications in cellular networks U Tefek, TJ Lim 2016 IEEE Wireless Communications and Networking Conference, 1-6, 2016 | 17 | 2016 |
Sentinel based malicious relay detection in wireless IoT networks A Tandon, TJ Lim, U Tefek Journal of Communications and Networks 21 (5), 458-468, 2019 | 15 | 2019 |
Caching-based multicast message authentication in time-critical industrial control systems U Tefek, E Esiner, D Mashima, B Chen, YC Hu IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1039-1048, 2022 | 14 | 2022 |
Network dimensioning, QoE maximization, and power control for multi-tier machine-type communications D Han, H Minn, U Tefek, TJ Lim IEEE Transactions on Communications 67 (1), 859-872, 2018 | 13 | 2018 |
Sentinel based malicious relay detection scheme for wireless IoT networks A Tandon, TJ Lim, U Tefek 2018 IEEE Globecom Workshops (GC Wkshps), 1-6, 2018 | 11 | 2018 |
Full-duplex relaying in machine-type communications with a multi-antenna base station U Tefek, TJ Lim IEEE Transactions on Wireless Communications 17 (9), 5804-5817, 2018 | 9 | 2018 |
Channel-hopping on multiple channels for full rendezvous diversity in cognitive radio networks U Tefek, TJ Lim 2014 IEEE Global Communications Conference, 4714-4719, 2014 | 9 | 2014 |
Analysis of message authentication solutions for IEC 61850 in substation automation systems U Tefek, E Esiner, D Mashima, YC Hu 2022 IEEE International Conference on Communications, Control, and Computing …, 2022 | 8 | 2022 |
Message authentication and provenance verification for industrial control systems E Esiner, U Tefek, D Mashima, B Chen, Z Kalbarczyk, DM Nicol ACM Transactions on Cyber-Physical Systems 7 (4), 1-28, 2023 | 4 | 2023 |
A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies U Tefek, E Esiner, C Cheh, D Mashima 2023 IEEE Conference on Communications and Network Security (CNS), 1-6, 2023 | 4 | 2023 |
Malicious relay detection using sentinels: A stochastic geometry framework U Tefek, A Tandon, TJ Lim Journal of Communications and Networks 22 (4), 303-315, 2020 | 3 | 2020 |
Network dimensioning and radio resource management for multi-tier machine-type communications D Han, U Tefek, TJ Lim, H Minn GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017 | 3 | 2017 |
Full-duplex SIMO relaying for machine-type communications in cellular networks U Tefek, TJ Lim 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 1-6, 2017 | 3 | 2017 |
Cyber-Physical Systems H Mousavi, A Ebnenasir, E Mahmoudzadeh, X Fan, Q Wang, J Liu, ... ACM Transactions on 7 (4), 2023 | 1 | 2023 |
Cryptographic security concerns on timestamp sharing via a public channel in quantum-key-distribution systems M Pahalⲓ, K Durak, U Tefek Physical Review A 106 (1), 012611, 2022 | 1 | 2022 |
Coverage analysis of cooperative relaying for urban transportation systems in tunnels U Tefek, E Esiner ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 1 | 2020 |
A Security Policy Engine for Building Energy Management Systems J Lim, W Ong, U Tefek, E Esiner International Conference on Applied Cryptography and Network Security, 231-244, 2023 | | 2023 |