Author of the publication

Wireless Power Transfer and Cooperative Jamming for Secrecy Throughput Maximization.

, and . IEEE Wirel. Commun. Lett., 5 (5): 556-559 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gaussian Mixture Variational Autoencoder for Semi-Supervised Topic Modeling., , , , and . IEEE Access, (2020)基于文化基因算法和最小二乘支持向量机的安全数据特征处理方法 (Feature Processing Approach Based on MA-LSSVM in Safety Data)., , , , and . 计算机科学, 44 (3): 237-241 (2017)Social network user influence sense-making and dynamics prediction., , , , , and . Expert Syst. Appl., 41 (11): 5115-5124 (2014)Differentially private classification with decision tree ensemble., , , and . Appl. Soft Comput., (2018)ElasticSim: A Toolkit for Simulating Workflows with Cloud Resource Runtime Auto-Scaling and Stochastic Task Execution Times., , and . J. Grid Comput., 15 (2): 257-272 (2017)A delay-based dynamic scheduling algorithm for bag-of-task workflows with stochastic task execution times in clouds., , , and . Future Gener. Comput. Syst., (2017)Resource allocation based on quantum particle swarm optimization and RBF neural network for overlay cognitive OFDM System., , , , , and . Neurocomputing, (2016)CAD: Command-Level Anomaly Detection for Vehicle-Road Collaborative Charging Network., , , , and . IEEE Access, (2019)Detecting the research structure and topic trends of social media using static and dynamic probabilistic topic models., , , and . Aslib J. Inf. Manag., 75 (2): 215-245 (2023)Low-cohesion differential privacy protection for industrial Internet., , , , , , and . J. Supercomput., 76 (11): 8450-8472 (2020)