Comprehensive Analysis of CNN-Based Models for SNR Estimation
AA. Mahbub, I. Ahmad and S. Shin
IEEE Access, vol. 13, pp. 213346-213361, Dec. 2025
SCBIR-PE: Secure Content-based Image Retrieval with Perceptual Encryption
MS. Uzzal, I. Ahmad, and S. Shin
IEEE Transactions on Dependable and Secure Computing, Oct. 2025 (Early Access)
Privacy-Preserving Uncertainty Calibration using Perceptual Encryption in Cloud-Edge Collaborative Artificial Intelligence of Things
I. Ahmad, J. Kim, and S. Shin
IEEE Internet of Things Journal, vol. 12, no. 13, pp. 25424-25441, Jul. 2025
Auto Digit Selection for Most Significant Digit First Multiplication
S. Gorgin, G. Jaberipur, JA. Lee, S. Shin, and J. Kim
IEEE Embedded Systems Letters, vol. 17, no. 4, pp. 272-275, Aug. 2025
Secure Retrieval of Brain Tumor Images Using Perceptual Encryption in Cloud-Assisted Scenario
I. Ahmad, Md S. Uzzal, and S. Shin
Electronics, vol. 14, no. 4, Apr. 2025
LEAF: A Lifestyle Approximation Framework Based on Analysis of Mobile Network Data in Smart Cities
S. Moghari, MK. Fallah, S. Gorgin, S. Shin
Smart Cities, vol. 7, no. 6, Dec. 2024
Enhancing Global Model Performance in Federated Learning with Non-IID Data using a Data-Free Generative Diffusion Model
M. Najafi, M. Daneshtalab, JA. Lee, G. Saadloonia, and S. Shin
IEEE Access, vol. 12, Oct. 2024
Deep Learning in Physical Layer: Review on Data Driven End-to-End Communication Systems and their Enabling Semantic Applications
N. Islam and S. Shin
IEEE Open Journal of the Communications Society, vol. 5, pp. 4207-4240, July 2024
Robust Deep Learning Models for OFDM-based Image Communication Systems in Intelligent Transportation Systems (ITS) for Smart Cities
N. Islam and S. Shin
Electronics, vol. 12, no. 11, p. 2425, May 2023
Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives
I. Ahmad, W. Choi and S. Shin
Sensors, vol. 23, no. 8, p. 4057, Apr. 2023
IIB–CPE: Inter and Intra Block Processing-Based Compressible Perceptual Encryption Method for Privacy-Preserving Deep Learning
I. Ahmad and S. Shin
Sensors, vol. 22, no. 20, p. 8074, Oct. 2022
Survey on Multi-Path Routing Protocols of Underwater Wireless Sensor Networks: Advancement and Applications
II. Shovon and S. Shin
Electronics, vol. 11, no. 21, p. 3467, Oct. 2022
A Perceptual Encryption-Based Image Communication System for Deep Learning-Based Tuberculosis Diagnosis Using Healthcare Cloud Services
I. Ahmad and S. Shin
Electronics, vol. 11, no. 16, p. 2514, Aug. 2022
A Novel Hybrid Image Encryption–Compression Scheme by Combining Chaos Theory and Number Theory
I. Ahmad and S. Shin
Signal Processing: Image Communication, vol. 98, p. 116418, Oct. 2021
Novel Approaches to Realize the Reliability of Location Privacy Protocols in Monitoring Wireless Networks
LC. Mutalemwa and S. Shin
IEEE Access, vol. 9, pp. 104820-104836, Jul. 2021
A classification of the Enabling Techniques for Low Latency and Reliable Communications in 5G and Beyond: AI-Enabled Edge Caching
LC. Mutalemwa and S. Shin
IEEE Access, vol. 8, pp. 205502-205533, Nov. 2020
Comprehensive Performance Analysis of Privacy Protection Protocols Utilizing Fake Packet Injection Techniques
LC. Mutalemwa and S. Shin
IEEE Access, vol. 8, pp. 76935-76950, Apr. 2020
Automated single Cardiomyocyte Characterization by Nucleus Extraction from Dynamic Holographic Images using a Fully Convolutional Neural Network
E. Ahmadzadeh, K. Jaferzadeh, S. Shin, and I Moon
Biomedical optics express 11 (3), 1501-1516, 2020
Traffic Offloading in Multicast Device-to-Device Cellular Networks: A Combinatorial Auction-based Matching Algorithm
DD. Ningombam, and S. Shin
Sensors, vol. 20, no. 4, p. 1128, 2020
Secure Routing Protocols for Source Node Privacy Protection in Multi-Hop Communication Wireless Networks
LC. Mutalemwa and S. Shin
Energies, vol. 13, no. 2, p. 292, 2020
Efficient Compression Schemes for Double Random Phase-encoded Data for Image Authentication
S. Gholami, K. Jaferzadeh, S. Shin, and I. Moon
Current Optics and Photonics vol. 3 no. 5, p. 390-400, 2019
Regulating the Packet Transmission Cost of Source Location Privacy Routing Schemes in Event Monitoring Wireless Networks
LC. Mutalemwa and S. Shin
IEEE Access vol. 7, p. 140169-140181, 2019
An Efficient Image-based Verification Scheme by Fusion of Double Random Phase Encoding and Dynamic Chaotic Map
S. Gholami, K. Jaferzadeh, S. Shin, and I. Moon
Multimedia Tools and Applications, vol. 78, p. 25001-25018, 2019
Fuzzy-Logic Dijkstra-based Energy-Efficient Algorithm for Data Transmission in WSNs
M. Razzaq and S. Shin
Sensors 2019, vol. 19, no. 5, 1040, Mar. 2019
Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks Through Proxy Node Routing
LC. Mutalemwa and S. Shin
Sensors 2019, vol 19, no. 5, 1037, Mar. 2019
Optimal resource management and binary power control in network-assisted D2D communications for higher frequency reuse factor
DD. Ningombam, and S. Shin
Sensors, vol. 19, no. 2, p. 251, Jan. 2019
Throughput Optimization Using Metaheuristic-Tabu Search in the Multicast D2D Communications Underlaying LTE-A Uplink Cellular Networks
DD. Ningombam, and S. Shin
Electronics, vol. 7, no. 12 p. 440, Dec. 2018
Distance-Constrained Outage Probability Analysis for Device-to-Device Communications Underlaying Cellular Networks with Frequency Reuse Factor of 2
DD. Ningombam, and S. Shin
Computers, vol. 7, no. 4 p. 50, Oct. 2018
Non-Orthogonal Resource Sharing Optimization for D2D Communication in LTE-A Cellular Networks: A Fractional Frequency Reuse-based Approach
DD. Ningombam, and S. Shin
Electronics, vol. 7, no. 10, p. 238, Oct. 2018
Strategic Location–based Random Routing for Source Location Privacy in Wireless Sensor Networks
LC. Mutalemwa and S. Shin
Sensors, vol. 18, no. 7, p. 2291, Jul. 2018
A Fast Channel Assignment Scheme for Emergency Handling in Wireless Body Area Networks
S. Nepal, A. Pudasaini, and S. Shin
Sensors, vol. 17, no. 3, pp. 1-16, Feb. 2017
Limited Area Broadcast for Warning Message Delivery over Vehicular Ad-Hoc Networks
M. Kang, IK. Virdaus, S. Shin, CG. Lee
EURASIP Journal on Wireless Communications and Networking, vol. 159, pp. 1-16, 2016
On Maximizing Tag Reading Efficiency of a Multi-Packet Reception Capable Radio Frequency Identification Reader
S. Pudasaini, KS. Kwak, and S. Shin
IET Communications, vol. 9, no. 5, pp. 701-706, Mar. 2015
Prioritized Access Control in IEEE 802.16 Networks
S. Pudasaini, S. Shin, and YT. Kim
International Journal of Electronics and Communications, vol. 69, no. 1, pp. 69-74, Jan. 2015
Efficient Transmission Mode Selection Scheme for MIMO-based WLANs
A. Thapa, KS. Kwak, and S. Shin
KSII Transaction on Internet and Information Systems, vol. 8, no. 7, pp. 2365-2382, Jul. 2014
A New Emergency-Handling Mechanism based on IEEE 802.15.4 for Health-Monitoring Applications
JS. Ranjit, S. Pudasaini, and S. Shin
KSII Transaction on Internet and Information Systems, vol. 8, no. 2, pp. 406-423, Feb. 2014
Precise-Optimal Frame Length based Collision Reduction Schemes for Frame Slotted Aloha RFID Systems
S. Dhakal and S. Shin
KSII Transaction on Internet and Information Systems, vol. 8, no. 1, pp. 165-182, Jan. 2014
A modified IEEE 802.15.4 Superframe Structure for Guaranteed Emergency Handling in Wireless Body Area Network
JS. Ranjit and S. Shin
Network Protocols and Algorithms, vol. 5, no. 2, Jun. 2013
Precise Time Systems Efficiency of a Frame Slotted ALOHA based Anti-Collision Algorithm in an RFID System
S. Dhakal and S. Shin
Network Protocols and Algorithms, vol. 5, no. 2, Jun. 2013
Cross-Layer Performance Analysis of CSMA/iCA based Wireless Local Area Network
S. Pudasaini and S. Shin
Wireless Personal Communications, vol. 67, pp. 63-77, 2012
Throughput and Reliability Analysis of a Scalable Broadcast MAC for Distributed Wireless Networks
S. Pudasaini, S. Shin, and K. Kim
EURASIP Journal on Wireless Communications and Networking, vol. 14, no. 1, p. 254, Aug. 2012
Achievable Performance of IEEE 802.11n MIMO Adapted WLANs with MAC Enhancement
A. Thapa and S. Shin
Information An International Interdisciplinary Journal, vol. 15, no. 7, pp. 3139-3148, July 2012
QoS Provisioning in Wireless Body Area Networks: A Review on MAC Aspects
A. Thapa and S. Shin
KSII Transaction on Internet and Information, vol. 6, no. 5, May 2012
Carrier Sense Multiple Access with Improvised Collision Avoidance and Short-Term Fairness
S. Pudasaini, S. Shin, and K. Kim
Wireless Networks, vol. 18, no. 8, pp. 915-927, Apr. 2012
Performance Characterization of CSMA/CA Adapted Multi-User MIMO Aware MAC in WLANs
A. Thapa, S. Pudasaini, and S. Shin
EURASIP Journal on Wireless Communications and Networking, vol. 27, no. 1, p. 141, Oct. 2011
A Reactive Cross Collision Exclusionary Backoff Algorithm in IEEE 802.11 Network
S. Pudasaini, Y. Chang, and S. Shin
KSII Transactions on Internet and Information, vol. 4, no. 6, pp. 1098-1115, 2010
COMIC: Intelligent Contention Window Control for Distributed Medium Access
S. Pudasaini, S. Shin, and J. Copeland
IEEE Communication Letters, vol. 14, no. 7, pp. 656-658, 2010
Fine-Tuning EfficientNet Feature Extraction for Efficiency in Image Retrieval Applications
G. Saadloonia, I. Ahmad and S. Shin
IEEE International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Tokyo, Japan, 2026 (Accepted)
A Fast and Secure Content-based Image Retrieval Scheme using Clustering and Searchable Encryption
MS. Uzzal, I. Ahmad, and S. Shin
IEEE International Conference on Information Networking (ICOIN), Hanoi, Vietnam, 2026 (Accepted)
A Lightweight CNN Model for SNR Estimation in OFDM Systems
AA. Mahbub, I. Ahmad, and S. Shin
KINGPC International Conference on Next Generation Computing (ICNGC), Da Nang, Vietnam, 2025
Privacy-Preserving Transfer Learning using Learnable Encryption
I. Ahmad, J. Kim and S. Shin
International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, 2025
Chaos-based Searchable Encryption Scheme for Secure Medical Image Retrieval using Edge Histogram Descriptor
MS. Uzzal, I. Ahmad, and S. Shin
IEICE International Symposium on Nonlinear Theory and Its Applications (NOLTA), Okinawa, Japan, 2025
Comparative Analysis of CNN Models for SNR Estimation
AA. Mahbub, I. Ahmad, and S. Shin
IEEE International Conference on Ubiquitous and Future Networks (ICUFN), Lisbon, Portugal, 2025 [Excellent Paper Award]
Learnable Encryption with a Diffusion Property
I. Ahmad, J. Kim and S. Shin
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Naples, Italy, 2025
Segmentation Aided Multiclass Tumor Classification in Ultrasound Images using Graph Neural Network
I. Islam Shovon, I. Ahmad, and S. Shin
IEEE International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Fukuoka, Japan, 2025
Secure Retrieval of Brain Tumor Images using Perceptual Encryption
I. Ahmad, M. S. Uzzal and S. Shin
IEEE International Conference on Big Data and Smart Computing (BigComp), Kota Kinabalu, Malaysia, 2025
Segmentation Aided Multiclass Classification of Lung Disease in Chest X-ray Images using Graph Neural Networks
II. Shovon, I. Ahmad, and S. Shin
IEEE International Conference on Information Networking (ICOIN), Chiang Mai, Thailand, 2025
Chaos Theory-based Learnable Encryption Scheme for Privacy-Preserving Medical Image Analysis
I. Ahmad, J. Kim and S. Shin
IEICE International Symposium on Nonlinear Theory and Its Applications (NOLTA), Ha long Bay, Vietnam, 2024
Perceptual Encryption-based Privacy-Preserving Image Retrieval Application
MS. Uzzal, I. Ahmad, and S. Shin
KINGPC International Conference on Next Generation Computing (ICNGC), Angeles City, Philippines, 2024
A Searchable Encryption Technique for Secure Color Image Retrieval
I. Ahmad, J. Kim, and S. Shin
IEEE International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, pp. 36-41, 2024
Hybrid Random Routing Protocol to Enhance the Performance of Routing Protocol in Source Location Privacy Using Ant Colony Optimization and Random Walk
II. Shovon and S. Shin
IEEE International Conference on Ubiquitous and Future Networks (ICUFN), Budapest, Hungary, pp. 573-578, July 2024
Impact of Source Coding on Downstream AI Applications
N. Islam, and S. Shin
IEEE International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Osaka, Japan, pp. 093-096, Feb 2024
Perceptual Image Encryption: A Communication Perspective
I. Ahmad and S. Shin
IEEE International Conference on Information Networking (ICOIN), Ho Chi Minh City, Vietnam, pp. 657-660, Jan 2024
Deep Learning-based Image Quality Assessment Metric for Quantifying Perceptual Distortions in Transmitted Images
I. Ahmad and S. Shin
IEEE International Symposium on Communications and Information Technologies (ISCIT), Sydney, Australia, pp. 208-213, 16-18 October 2023
Evaluation of Neural Demappers for Trainable Constellation in an End-to-End Communication System
N. Islam and S. Shin
IEEE International Conference on Ubiquitous and Future Networks (ICUFN), Paris, France, pp. 39-42, Jul. 2023
Noise-cuts-Noise Approach for Mitigating the JPEG Distortions in Deep Learning
I. Ahmad and S. Shin
IEEE International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 221–226, Feb. 2023
Robustness of Deep Learning enabled IoT Applications Utilizing Higher Order QAM in OFDM Image Communication System
N. Islam, I. Ahmad and S. Shin
IEEE International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 630–635, Feb. 2023
The Performance of Graph Neural Network in Detecting Fake News from Social Media Feeds
II. Shovon and S. Shin
IEEE International Conference on Information Networking (ICOIN), pp. 560-564, Feb. 2023
Perceptual Encryption-based Privacy-Preserving Deep Learning for Medical Image Analysis
I. Ahmad and S. Shin
IEEE International Conference on Information Networking (ICOIN), pp. 224–229, Jan. 2023 [BEST PAPER AWARD]
Performance Analysis of Cloud-based Deep Learning Models on Images Recovered without Channel Correction in OFDM System
I. Ahmad, N. Islam and S. Shin
IEEE Asia Pacific Conference on Communication (APCC), pp. 255-259, Oct. 2022
Perceptual Encryption-based Privacy-Preserving Deep Learning in Internet of Things Applications
I. Ahmad and S. Shin
IEEE International Conference on Information and Communication Technology Convergence (ICTC), pp. 1817–1822, Oct. 2022
Quantitative Assessment of the Impact of Lossy JPEG Compression on Deep Learning Models
I. Ahmad and S. Shin
KINGPC International Conference on Next Generation Computing (ICNGC), 249-252, Oct. 2022
Privacy-Preserving Surveillance for Smart Cities
I. Ahmad, E. Kim, S. Hwang and S. Shin
IEEE International Conference on Ubiquitous and Future Networks (ICUFN), pp. 301-306, Jul. 2022
Determining Jigsaw Puzzle State from an Image based on Deep Learning
I. Ahmad, S. Hwang and S. Shin
IEEE International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 030–032, Feb. 2022
Encryption-then-Compression System for Cloud-based Medical Image Services
I. Ahmad and S. Shin
IEEE International Conference on Information Networking (ICOIN), pp. 30–33, Jan. 2022 [BEST PAPER AWARD]
Fine-Tuning Pre-Trained Deep Learning Models for Multiclass Grayscale Images Classification
I. Ahmad and S. Shin
KINGPC International Conference on Next Generation Computing (ICNGC), pp. 244-246, Nov. 2021
An Approach to Run Pre-Trained Deep Learning Models on Grayscale Images
I. Ahmad and S. Shin
IEEE International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 177–180, Apr. 2021
Region-based Selective Compression and Selective Encryption of Medical Images
I. Ahmad and S. Shin
ACM International Conference on Smart Media and Applications (SMA), pp. 34–38, Sep. 2020 [BEST PAPER AWARD]
Analysis of Chinese Remainder Theorem for Data Compression
I. Ahmad, B. Lee, and S. Shin
IEEE International Conference on Information Networking (ICOIN), pp. 634–636, Jan. 2020
Interference Mitigation for Multicast D2D Communications Underlay Cellular Networks
DD. Ningombam, CG. Lee, and S. Shin
IEEE International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 459-462, Okinawa, Japan, Feb. 11-13, 2019
Just-Noticeable-Difference based Edge Map Quality Measure
I. Ahmad and S. Shin
KINGPC International Conference on Next Generation Computing (ICNGC), Vung Tau City, Vietnam, Dec. 20-23, 2018 [Best Poster Award]
Realizing source location privacy in wireless sensor networks through agent node routing
LC. Mutalemwa and S. Shin
International Conference on Information and Communication Technology Convergence (ICTC), pp. 1283-1285, Jeju, Oct. 17-19, 2018
A Novel Resource Sharing Mechanism for Device-to-Device Communications Underlaying LTE-A Uplink Cellular Networks
DD. Ningombam, S. Hwang, and S. Shin
IEEE International Conference on Ubiquitous and Future Networks (ICUFN), pp. 829-833, Praha, Czech, Jul.3-6, 2018
Energy efficient K-means Clustering-based Routing Protocol for WSN using Optimal Packet Size
M. Razzaq, DD. Ningombam and S. Shin
IEEE International Conference on Information Networking (ICOIN), pp. 632-635, Chiang May, Thailand, Jan.9-11, 2018
Outage Probability Analysis of Device-to-Device Communications with Frequency Reuse-2 in Fractional Frequency Reuse Method
DD. Ningombam and S. Shin
IEEE International Conference on Information Networking (ICOIN), pp. 341-345, Chiang May, Thailand, Jan.9-11, 2018
Color-to-Grayscale Algorithms Effect on Edge Detection — A Comparative Study
I. Ahmad, I. Moon and S. Shin
IEEE International Conference on Electronics, Information, and Communication (ICEIC), pp. 1-4, Jan. 2018
N-Puzzle: A General Application of 3n+1 Problem
I. Ahmad, Y. Chang, and S. Shin
KINGPC International Conference on Next Generation Computing, pp. 97-100, Kaoshung, Taiwan, Dec. 20-23, 2017 [Best Paper Award]
Fractional Frequency Reuse Scheme for Interference Mitigation in Device-to-Device Communication Underlying LTE-A Networks
DD. Ningombam, J. Pyun, S. Hwang, and S. Shin
Asilomar Conference on Signals, Systems, and Computers, Asilomar, USA, Oct. 2017
Radio Resource Allocation and Power Control Scheme to Mitigate Interference in Device-to-Device Communications Underlaying LTE-A Uplink Cellular Networks
DD. Ningombam and S. Shin
International Conference on Information and Communication Technology Convergence (ICTC), pp. 962-964, Jeju, Korea, Oct., 2017
Directional Random Routing for Enhancing Source-Location Privacy in Wireless Sensor Networks
A. Pudasaini, DD. Ningombam, S. Hwang, and S. Shin
IEEE International Conference on Ubiquitous and Future Networks (ICUFN), pp. 344-348, Milano, Italy, Jul. 07-10, 2017
A New Latency MAC Protocol for Smart Gird
S. Nepali, S. Hwang, and S. Shin
KINGPC International Conference on Next Generation Computing (ICNGC), pp.55-61, HoChiMinh Vietnam, Jan 5-7, 2017 [Best Paper Award]
A New MAC Protocol for Emergency Handling in Wireless Body Area Networks
S. Nepal, A. Pudasaini, J. Pyun, S. Hwang, CG. Lee, and S. Shin
IEEE International Conference on Ubiquitous and Future Networks (ICUFN), Vienna Austria, Jul. 2016
A Proposal Antenna Polarization Diversity for LTE 2x2 MIMO in Indoor Testbed
NT. Duc and S. Shin
IEEE International Conference on Ubiquitous and Future Networks (ICUFN), pp.35-36, July 2015
Deanonymizing Schemes of Hidden Services in Tor Network: A Survey
S. Nepal, S. Dahal, and S. Shin
IEEE International Conference on Information Networking (ICOIN), pp. 468-473, Siam Leap, Cambodia, Jan. 2015
Analysis on End-to-End Node Selection Probability in Tor Network
S. Dahal, J. Lee, J. Kang, and S. Shin
IEEE International Conference on Information Networking (ICOIN), pp. 46-50, Siam Leap, Cambodia, Jan. 2015
Enhanced Location Detection Algorithms based on Time of Arrival Trilateation
S. Pradhan, J. Pyun, G. Kwon, S. Shin, and S. Hwang
Asilomar Conference on Signals,Systems and Computers,pp.1-6,Asilomar,USA, Nov.2-5,2014
Improving IEEE 1588v2 Time Synchronization Performance with Phase Locked Loop
RH. Jahja, S. Dahal, S. Hwang, G. Kwon, J. Pyun, and S. Shin
Asilomar Conference on Signals, Systems and Computers, pp. 1-6, USA, Nov. 2014
AOA Selection Algorithm for Multiple GPS Signals
S. Hwang, G. Kwon, J. Pyun, and S. Shin
Asilomar Conference on Signals, Systems and Computers, USA Oct. 2013
A Sequential Reading Strategy to Improve the Performance of RFID Anti-Collision Algorithm in Dense Tag Environments
S. Dhakal and S. Shin
IEEE International Conference on Ubiquitous and Future Networks (ICUFN), pp. 531-536, Jul. 2013
Characterizing Hidden Nodes with Experimental Evaluation in Noisy MANETs
S. Park, Y. Chang, S. Shin, and JA. Copeland
IEEE ICC2013, pp. 1763-1768, May 2013
TPMS Switching Beamformer based on Duplex Wireless Communications for Interference Suppression
S. Hwang, C. Park, S. Kim, GR. Kwon, JY. Pyun, and S. Shin
IEEE ICVES 2012, pp. 228-233, Jul. 2012
QoS Differentiation in CSMA/iCA based Medium Access Control Protocol for WLAN
S. Pudasaini and S. Shin
IEEE International Conference on Ubiquitous and Future Networks (ICUFN), pp. 340-345, July 2012
Femtocell Deployed Self-Organizing Network for U-Health: Opportunities and Challenges
A. Thapa and S. Shin
ICACT 2012, pp. 568-572, Feb. 2012
Adaptive Best-M Feedback Scheduling in Multiuser OFDMA Systems
T. Giang, S. Pudasaini, and S. Shin
ACM RACS, pp. 113-117, 2011
NRZ-OOK Signaling with LED Dimming for Visible Light Communication Link
J. Choi, E. Cho, C. Park, Z. Ghassemlooy, M. Kang, C. Lee, and S. Shin
NOC OC&I 2011, pp. 32-35, 2011
A Scalable MAC for Vehicular Ad Hoc Networks
M. Kang, C. Lee, S. Shin, and J. Moh
NOC OC&I, pp. 204-207, 2011
Intraclass Fairness Enhancement in EDCA via Adaptive Randomization of AIFS
R. Tamraka, S. Pudasaini, M. Kang, C. Lee, and S. Shin
NOC OC&I, 2011
Cross-Layer Analysis of CSMA/iCA-based Wireless Local Area Network
S. Pudasaini and S. Shin
IEEE International Conference on Ubiquitous and Future Networks (ICUFN), pp. 246-251, 2011 [Excellent Paper Award]
Error Tolerance in Wireless OFDM Data Transmission using Signal Quality Driven Symbol Re-Mapping
D. Lee, A. Chaterjee, S. Shin, and JA. Copeland
IEEE CCNC, pp. 1174-1176, 2011
Fast Broadcast at the Intersection in VANET
J. Cho, S. Shin, and JA. Copeland
IEEE CCNC, pp. 960-964, 2011
An Intelligent Contention Window Control Scheme for Distributed Medium Access
S. Pudasaini, A. Thapa, M. Kang, and S. Shin
IEEE CCNC, 2010