Author of the publication

Physical layer security issues in interference- alignment-based wireless networks.

, , , , and . IEEE Commun. Mag., 54 (8): 162-168 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Petri net-based response policies to process module failure in time-constrained single-arm cluster tools., , , and . ICNSC, page 144-149. IEEE, (2014)Petri net-based scheduling analysis of dual-arm cluster tools subject to wafer revisiting and residency time constraints., , , and . ICNSC, page 252-257. IEEE, (2013)Multi-Point Ethernet over Next-Generation SONET/SDH., , , , , , and . ICC, page 1-6. IEEE, (2009)A Multi-Level DDoS Mitigation Framework for the Industrial Internet of Things., , , , and . IEEE Communications Magazine, 56 (2): 30-36 (2018)A Novel Algorithm for Wafer Sojourn Time Analysis of Single-Arm Cluster Tools With Wafer Residency Time Constraints and Activity Time Variation., , , and . IEEE Trans. Syst. Man Cybern. Syst., 45 (5): 805-818 (2015)Agricultural Pest Super-Resolution and Identification With Attention Enhanced Residual and Dense Fusion Generative and Adversarial Network., , , and . IEEE Access, (2020)Efficient probe selection for fault localization using the property of submodularity., , and . Int. J. Commun. Syst., 26 (1): 84-99 (2013)Markov Chain Monte Carlo Based Energy Use Behaviors Prediction of Office Occupants., , , , and . Algorithms, 13 (1): 21 (2020)Service overlays for Ethernet LAN over SONET/SDH., , , , , and . Opt. Switch. Netw., 7 (2): 54-65 (2010)Evasion Attacks Based on Wasserstein Generative Adversarial Network., , and . ComComAP, page 454-459. IEEE, (2019)