Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering., , , , , and . CyberC, page 42-45. IEEE, (2016)Energy-Saving Offloading by Jointly Allocating Radio and Computational Resources for Mobile Edge Computing., , , and . IEEE Access, (2017)User-Centric Precoding Designs for the Non-Regenerative MIMO Two-Way Relay Systems., , , and . IEEE Communications Letters, 20 (10): 1935-1938 (2016)Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography., , , and . Comput. J., 55 (6): 702-716 (2012)Cellular direction information based differential evolution for numerical optimization: an empirical study., , , , and . Soft Comput., 20 (7): 2801-2827 (2016)Random Walk Routing in WSNs with Regular Topologies., , and . J. Comput. Sci. Technol., 21 (4): 496-502 (2006)Joint Beamforming and User Selection in Multiuser Collaborative MIMO SWIPT Systems With Nonnegligible Circuit Energy Consumption., , , , and . IEEE Trans. Vehicular Technology, 67 (5): 3909-3923 (2018)A Service-Differentiated Random Access Strategy for Multi-channel Cooperative Relaying Networks., , and . Wireless Personal Communications, 47 (4): 479-495 (2008)A Novel Connection Correlation Scheme Based on Threshold Secret Sharing., , , , and . IEEE Communications Letters, 20 (12): 2414-2417 (2016)Traffic allocation scheme with cooperation of WWAN and WPAN., , , , and . IEEE Communications Letters, 14 (6): 551-553 (2010)