Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power optimization for FPRM logic using approximate computing technique., and . ASICON, page 1-4. IEEE, (2019)软件系统故障传播模型研究进展 (Research Progress on Error Propagation Model in Software System)., and . 计算机科学, 43 (6): 1-9 (2016)Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks., , , and . IEEE Trans. Ind. Informatics, 12 (1): 291-300 (2016)Polarization-Based Long-Range Communication Directional MAC Protocol for Cognitive Ad Hoc Networks., , and . IEICE Trans. Commun., 94-B (5): 1265-1275 (2011)A survey on dynamic spectrum access protocols for distributed cognitive wireless networks., , , and . EURASIP J. Wireless Comm. and Networking, (2012)Traffic-aware overload control scheme in 5G ultra-dense M2M networks., , , , and . Trans. Emerg. Telecommun. Technol., (2017)基于神经网络的软件质量评价综述 (Software Quality Evaluation Based on Neural Network: A Systematic Literature Review)., and . 计算机科学, 46 (11A): 507-516 (2019)Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement., , , , and . VTC Spring, page 1-5. IEEE, (2017)Outage Constrained Secrecy Rate Maximization for Relay Networks against Unknown Eavesdroppers., , , , and . WCNC, page 1-6. IEEE, (2017)Prediction based interference management and distributed trajectory regulation in amorphous cells., , , , , and . WCNC Workshops, page 299-304. IEEE, (2015)