Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Frequency Offset and Channel Estimation for MIMO Systems in the Presence of Timing Error., , , and . CSSP, 29 (2): 275-293 (2010)Enabling Network Anti-Inference via Proactive Strategies: A Fundamental Perspective., and . IEEE/ACM Trans. Netw., 25 (1): 43-55 (2017)Risk assessment based access control with text and behavior analysis for document management., and . MILCOM, page 37-42. IEEE, (2016)Integrating Social Links into Wireless Networks: Modeling, Routing, Analysis, and Evaluation., , and . IEEE Trans. Mob. Comput., 18 (1): 111-124 (2019)Cyber Deception: Overview and the Road Ahead., and . IEEE Secur. Priv., 16 (2): 80-85 (2018)Defending active learning against adversarial inputs in automated document classification., , , and . GlobalSIP, page 257-261. IEEE, (2016)When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions., , , , , , and . CoRR, (2020)On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid., , and . IEEE Syst. J., 12 (4): 3404-3413 (2018)Steel Surface Defect Detection via Deformable Convolution and Background Suppression., , , , and . IEEE Trans. Instrum. Meas., (2023)Security and Privacy in Internet of Things with Crowd-Sensing., , , , and . J. Electr. Comput. Eng., (2017)