Hamid Sharif

Engineering The University of Nebraska - Lincoln, Lincoln, NE 
Electronics and Electrical Engineering
"Hamid Sharif"
BETA: Related publications


You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Qi Q, Peng D, Sharif H. (2016) DST approach to enhance audio quality on lost audio packet steganography Eurasip Journal On Information Security. 2016
Dahal P, Peng D, Sharif H. (2016) Image processing pipeline model integrating steganographic algorithms for mobile cameras Wtmc 2016 - Proceedings of the 2016 Acm International Workshop On Traffic Measurements For Cybersecurity, Co-Located With Asia Ccs 2016. 50-57
Evans T, Tossou K, Ye F, et al. (2016) A new architecture for application-aware cognitive multihop wireless networks Ieee Wireless Communications. 23: 120-127
Rakshit SM, Hempel M, Sharif H. (2016) An analytical model of energy consumption in Hybrid Technology Networking 2015, 9th International Conference On Signal Processing and Communication Systems, Icspcs 2015 - Proceedings
Siavoshi S, Kavian YS, Sharif H. (2016) Load-balanced energy efficient clustering protocol for wireless sensor networks Iet Wireless Sensor Systems. 6: 67-73
Zheng M, Liang W, Yu H, et al. (2016) Utility-based opportunistic spectrum access for cognitive radio sensor networks: Joint spectrum sensing and random access control Iet Communications. 10: 1044-1052
Mazaheri M, Kavian YS, Sharif H, et al. (2016) Low end-to-end delay fuzzy networking protocol for mobile wireless sensing Wireless Communications and Mobile Computing
Shu Z, Qian Y, Yang YL, et al. (2016) A game theoretic approach for energy-efficient communications in multi-hop cognitive radio networks Wireless Communications and Mobile Computing
Shu Z, Qian Y, Yang Y, et al. (2016) A cross-layer study for application-aware multi-hop cognitive radio networks Wireless Communications and Mobile Computing. 16: 607-619
Qi Q, Sharp A, Peng D, et al. (2016) Real-time audio steganography attack based on automatic objective quality feedback Security and Communication Networks. 9: 737-746
See more...