Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach., , , and . IEEE Communications Letters, 19 (12): 2270-2273 (2015)Secure Cooperative Communication With Nondedicated Relays., , and . IEEE Trans. Vehicular Technology, 67 (8): 7811-7815 (2018)On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications., and . Sensors, 19 (5): 1158 (2019)Matting and super-pixel based target tracking algorithm., , , and . ICACI, page 223-228. IEEE, (2015)Analysis of Temporal and Spatial Variation of Growing Season Drought in Jiling Province Based on Standardized Precipitation Evapotranspiration Index., , , , and . Agro-Geoinformatics, page 1-5. IEEE, (2019)Drought monitoring using MODIS derived perpendicular drought indexes., , , and . Agro-Geoinformatics, page 1-4. IEEE, (2019)Classification of LiDAR Point Cloud based on Multiscale Features and PointNet., , , , and . IPTA, page 1-7. IEEE, (2018)Physical layer security based on real interference alignment in K-user MIMO Y wiretap channels., , , and . ICC Workshops, page 207-212. IEEE, (2016)Secure Secondary Communications with Curious Primary Users in Cognitive Underlay Networks., , , and . VTC Spring, page 1-5. IEEE, (2016)AF-Based CSI Feedback for User Selection in Multi-User MIMO Systems., , , , , and . GLOBECOM, page 1-6. IEEE, (2015)