Author of the publication

Key generation through two-way relay channels under active attacks.

, , and . ACSSC, page 56-60. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secret Key Generation in the Two-Way Relay Channel With Active Attackers., , and . IEEE Trans. Inf. Forensics Secur., 9 (3): 476-488 (2014)A Multi-Frequency DQ Impedance Measurement Algorithm for Single-Phase Vehicle-Grid System in Electrified Railways., , , , and . IEEE Trans. Veh. Technol., 71 (2): 1372-1383 (2022)Position-Aware Relation Learning for RGB-Thermal Salient Object Detection., , , , , , and . CoRR, (2022)Detection of mobile machine damage using accelerometer data and prognostic health monitoring techniques., , , , and . CIVVS, page 101-104. IEEE, (2009)A low-phase-noise 18 GHz Kerr frequency comb spanning 65 THz., , , , , and . OFC, page 1-3. IEEE, (2015)Coherent optical communications using coherence-cloned Kerr soliton microcombs as carriers and local oscillators., , , , , and . OFC, page 1-3. IEEE, (2021)Infrared image denoising using mixed statistical model in nonsubsampled contourlet domain., , , and . ICIA, page 433-436. IEEE, (2015)MAKG: A Mobile Application Knowledge Graph for the Research of Cybersecurity., , , , , and . CCKS, volume 1466 of Communications in Computer and Information Science, page 321-328. Springer, (2021)Rethinking referring relationships from a perspective of mask-level relational reasoning., , , , and . Pattern Recognit., (2023)An Evidential-enhanced Tri-Branch Consistency Learning Method for Semi-supervised Medical Image Segmentation., , , , , and . CoRR, (2024)