Blockchain-empowered framework for decentralized network management in 6G T Maksymyuk, J Gazda, M Volosin, G Bugar, D Horvath, M Klymash, ... IEEE Communications Magazine 58 (9), 86-92, 2020 | 124 | 2020 |
A novel method of image steganography in DWT domain V Banoci, G Bugar, D Levický Proceedings of 21st International Conference Radioelektronika 2011, 1-4, 2011 | 54 | 2011 |
Unsupervised learning algorithm for intelligent coverage planning and performance optimization of multitier heterogeneous network J Gazda, E ŠLapak, G Bugár, D Horváth, T Maksymyuk, M Jo IEEE Access 6, 39807-39819, 2018 | 50 | 2018 |
Blockchain-empowered service management for the decentralized metaverse of things T Maksymyuk, J Gazda, G Bugár, V Gazda, M Liyanage, M Dohler IEEE Access 10, 99025-99037, 2022 | 44 | 2022 |
Steganography systems by using CDMA techniques V Banoci, G Bugar, D Levicky 2009 19th International Conference Radioelektronika, 183-186, 2009 | 18 | 2009 |
Techno-economic framework for dynamic operator selection in a multi-tier heterogeneous network G Bugár, M Vološin, T Maksymyuk, J Zausinová, V Gazda, D Horváth, ... Ad Hoc Networks 97, 102007, 2020 | 17 | 2020 |
Data hiding in still images based on blind algorithm of steganography G Bugár, V Bánoci, M Broda, D Levický, D Dupák 2014 24th International Conference Radioelektronika, 1-4, 2014 | 17 | 2014 |
Histogram secure steganography system in JPEG file based on modulus function V Banoci, G Bugar, D Levický, Z Klenovičová Proceedings of 22nd International Conference Radioelektronika 2012, 1-4, 2012 | 14 | 2012 |
Dynamic spectrum leasing and retail pricing using an experimental economy J Gazda, G Bugár, M Vološin, P Drotár, D Horváth, V Gazda Computer Networks 121, 173-184, 2017 | 13 | 2017 |
Performance evaluation of feature-based steganalysis in steganography D Majercak, V Banoci, M Broda, G Bugar, D Levicky 2013 23rd International Conference Radioelektronika (RADIOELEKTRONIKA), 377-382, 2013 | 10 | 2013 |
Blind steganography based on 2D Haar transform G Bugár, V Bánoci, M Broda, D Levický, E Mikó Proceedings ELMAR-2013, 31-35, 2013 | 9 | 2013 |
Deep learning based mobile network management for 5G and beyond T Maksymyuk, J Gazda, M Ružička, E Slapak, G Bugar, L Han 2020 IEEE 15th International Conference on Advanced Trends in …, 2020 | 8 | 2020 |
Comparative Analysis of Feed-Forward and RNN Models for Intrusion Detection in Data Network Security with UNSW-NB15 Dataset M Čavojský, G Bugár, D Levický 2023 33rd International Conference Radioelektronika (RADIOELEKTRONIKA), 1-6, 2023 | 7 | 2023 |
Intelligent framework for radio access network design T Maksymyuk, E Šlapak, G Bugár, D Horváth, J Gazda Wireless Networks 26, 759-774, 2020 | 6 | 2020 |
Universal image steganalytic method V Banoci, M Broda, G Bugar, D Levický Radioengineering 23 (4), 1213-1220, 2014 | 6 | 2014 |
HetNet spatial topology design using mini-batch K-means clustering E Slapak, J Gazda, G Bugar, M Volosin, D Horvath, T Maksymyuk 2019 IEEE 15th International Conference on the Experience of Designing and …, 2019 | 5 | 2019 |
A novel JPEG steganography method secure against histogram steganalysis D Levický, G Bugár, V Bánoci Proceedings ELMAR-2012, 79-82, 2012 | 5 | 2012 |
Authentication threats in PSTN-VoIP architecture using multi-service gateways P Gallo, D Levický, G Bugar Proceedings ELMAR-2012, 153-156, 2012 | 5 | 2012 |
Financial implications of femtocell deployment J Zausinová, M Zoričak, G Bugár, J Gazda MATEC Web of Conferences 227, 03006, 2018 | 4 | 2018 |
Universal image steganalytic method based on binary similarity measures M Broda, D Levický, V Bánoci, G Bugár 2014 24th International Conference Radioelektronika, 1-4, 2014 | 4 | 2014 |