Author of the publication

Covert Threat Region Analysis of 3-D Location-Based Beamforming in Rician Channel.

, , , , and . IEEE Wirel. Commun. Lett., 11 (6): 1253-1257 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CT-MAC: a MAC protocol for underwater MIMO based network uplink communications., , , , and . WUWNet, page 23. ACM, (2012)"Busy terminal problem" and implications in underwater acoustic networks., , , and . WUWNet, page 45. ACM, (2012)Interactive Video Layer Decomposition and Matting., , and . ACCV Workshops (2), volume 6469 of Lecture Notes in Computer Science, page 52-61. Springer, (2010)Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted., , , and . VTC Fall, page 1-5. IEEE, (2016)Robust Artificial Noise Aided Transmit Method for Multicast MISO Wiretap Channels with Imperfect Covariance-Based CSI., , , , and . VTC Spring, page 1-5. IEEE, (2015)LoI-Based Flow Control on Low-Bandwidth Federates., and . Edutainment, volume 4469 of Lecture Notes in Computer Science, page 904-915. Springer, (2007)Practical Coding-based Multi-Hop Reliable Data Transfer for underwater acoustic networks., , , , , and . GLOBECOM, page 5751-5756. IEEE, (2012)An efficient MAC protocol for underwater multi-user uplink communication networks., , , , and . Ad Hoc Networks, (2015)Formation mechanism of knowledge rigidity in firms., and . J. Knowl. Manag., 15 (5): 820-835 (2011)Learning Spatial and Temporal Extents of Human Actions for Action Detection., , and . IEEE Trans. Multim., 17 (4): 512-525 (2015)