Publications (4)
Publication year
Publication type
A2 Review article, Literature review, Systematic review
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security (2019)
IEEE Communications Surveys and Tutorials, 21 (3), 2734-2771, http://doi.org/10.1109/COMST.2018.2865607, OA
Jameel, Furqan; Wyne, Shurjeel; Kaddoum, Georges; Duong, Trung Q.
A2 Review article, Literature review, Systematic review
Soft Computing, 23 (9), 3137-3166, http://doi.org/10.1007/s00500-017-2965-0, OA
Chugh, Tinkle; Sindhya, Karthik; Hakanen, Jussi; Miettinen, Kaisa
A2 Review article, Literature review, Systematic review
Data-Driven Evolutionary Optimization : An Overview and Case Studies (2019)
IEEE Transactions on Evolutionary Computation, 23 (3), 442-458, http://doi.org/10.1109/TEVC.2018.2869001, OA
Jin, Yaochu; Wang, Handing; Chugh, Tinkle; Guo, Dan; Miettinen, Kaisa
A2 Review article, Literature review, Systematic review
How stage theorizing can improve recommendations against phishing attacks (2019)
Information Technology and People, 32 (4), 828-857, http://doi.org/10.1108/ITP-12-2017-0434
Tambe Ebot, Alain Claude