Author of the publication

Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks.

, , , , and . IEEE Access, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cooperative communications with relay selection in wireless sensor networks., , , and . IEEE Trans. Consumer Electronics, 55 (2): 513-517 (2009)Exploiting Fountain Codes for Secure Wireless Delivery., , , , and . IEEE Communications Letters, 18 (5): 777-780 (2014)Inverted decoupling based active disturbance rejection control for multivariable systems., , , , and . CDC, page 7353-7358. IEEE, (2015)Grad-Cam Guided Progressive Feature CutMix for Classification., , and . CoRR, (2020)Learning Posterior and Prior for Uncertainty Modeling in Person Re-Identification., , , and . CoRR, (2020)Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement., , , , and . VTC Spring, page 1-5. IEEE, (2017)Outage Constrained Secrecy Rate Maximization for Relay Networks against Unknown Eavesdroppers., , , , and . WCNC, page 1-6. IEEE, (2017)Prediction based interference management and distributed trajectory regulation in amorphous cells., , , , , and . WCNC Workshops, page 299-304. IEEE, (2015)Cooperative Physical-Layer Approach for Downlink Privacy Preserving in Multiuser Relay Networks., , , , , and . GLOBECOM, page 1-7. IEEE, (2016)Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks., , , and . IEEE Trans. Ind. Informatics, 12 (1): 291-300 (2016)