Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power optimization for FPRM logic using approximate computing technique., and . ASICON, page 1-4. IEEE, (2019)基于神经网络的软件质量评价综述 (Software Quality Evaluation Based on Neural Network: A Systematic Literature Review)., and . 计算机科学, 46 (11A): 507-516 (2019)A survey on dynamic spectrum access protocols for distributed cognitive wireless networks., , , and . EURASIP J. Wireless Comm. and Networking, (2012)Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement., , , , and . VTC Spring, page 1-5. IEEE, (2017)Outage Constrained Secrecy Rate Maximization for Relay Networks against Unknown Eavesdroppers., , , , and . WCNC, page 1-6. IEEE, (2017)Prediction based interference management and distributed trajectory regulation in amorphous cells., , , , , and . WCNC Workshops, page 299-304. IEEE, (2015)Cooperative Physical-Layer Approach for Downlink Privacy Preserving in Multiuser Relay Networks., , , , , and . GLOBECOM, page 1-7. IEEE, (2016)QoS and Security Aware Power Allocation Scheme for Wiretap Cognitive Radio Networks., , , and . VTC Fall, page 1-6. IEEE, (2018)Power-Efficient Uplink Resource Allocation for Ultra-Reliable and Low-Latency Communication., , , , , and . VTC Fall, page 1-5. IEEE, (2019)Test Case Priority Ranking Method Based on Greedy Algorithm., , and . QRS Companion, page 605-613. IEEE, (2023)