Author of the publication

Secrecy Analysis of Multiuser Untrusted Amplify-and-Forward Relay Networks.

, , , , , and . Wirel. Commun. Mob. Comput., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Invocation Cost Optimization Method for Web Services in Cloud Environment., , and . Sci. Program., (2017)Optimal PPVO-based reversible data hiding., , , and . J. Vis. Commun. Image Represent., (2017)Introduction to the special issue on deep learning for real-time information hiding and forensics., , , and . J. Real-Time Image Processing, 17 (1): 1-5 (2020)A solution for cyclic scheduling of multi-hoists without overlapping., and . Ann. Oper. Res., 168 (1): 5-21 (2009)Lagrangean relaxation and hybrid simulated annealing tabu search procedure for a two-echelon capacitated facility location problem with plant size selection., , , , and . Int. J. Prod. Res., 55 (9): 2540-2555 (2017)Secret Image Sharing Based on Encrypted Pixels., , , and . IEEE Access, (2018)Two heuristics for the capacitated multi-period cutting stock problem with pattern setup cost., , and . Comput. Oper. Res., (2019)Dynamic Marketing Resource Allocation with Two-Stage Decisions., , , and . J. Theor. Appl. Electron. Commer. Res., 17 (1): 327-344 (2022)GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems., , , , , , and . IEEE Trans. Netw. Sci. Eng., 10 (5): 2779-2790 (September 2023)A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography., , , , and . CoRR, (2024)