Author of the publication

Identification and Elimination of Abnormal Information in Electromagnetic Spectrum Cognition.

, , , , , and . ADHIP, volume 279 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-88. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of Adversarial Attacks Based on DL in Communication Networks., and . DSA, page 251-252. IEEE, (2020)Signal Recognition Based On Federated Learning., , , and . INFOCOM Workshops, page 1105-1110. IEEE, (2020)Bio-inspired contour detection model based on multi-bandwidth fusion and logarithmic texture inhibition., , , and . IET Image Process., 13 (12): 2304-2313 (2019)Identification and Elimination of Abnormal Information in Electromagnetic Spectrum Cognition., , , , , and . ADHIP, volume 279 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-88. Springer, (2018)An Empirical Study on Android Malware Characterization by Social Network Analysis., , , and . IEEE Trans. Reliab., 73 (1): 757-770 (March 2024)Evaluating and Improving Adversarial Attacks on DNN-Based Modulation Recognition., , , and . GLOBECOM, page 1-5. IEEE, (2020)Optimized Password Recovery for Encrypted RAR on GPUs., , , , and . CoRR, (2015)Performance Evaluation of Machine Learning in Wireless Connected Robotics Swarms., , , and . IEEE Access, (2020)Welding Seam Extraction from Point Cloud of Large-Sized Structural Steel Workpieces., , , and . ROBIO, page 1-6. IEEE, (2023)Threats of Adversarial Attacks in DNN-Based Modulation Recognition., , , , and . INFOCOM, page 2469-2478. IEEE, (2020)