Author of the publication

Secrecy Communication for Simultaneous Transmission and Reflection (STAR) RIS Aided Systems With Multiple Eavesdroppers.

, , , , and . PIMRC, page 1-6. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid splitting algorithm for wireless MAC., , and . IEEE Communications Letters, 9 (5): 468-470 (2005)Finding groups of friends who are significant across multiple domains in social networks., , , , and . CASoN, page 21-26. IEEE, (2013)Pedestrian detection based on hierarchical co-occurrence model for occlusion handling., , , and . Neurocomputing, (2015)A New SQRD-Based Soft Interference Cancelation Scheme in Multi-User MIMO SC-FDMA System., , and . IEEE Communications Letters, 21 (4): 821-824 (2017)Intelligent Question Answering Model Based on CN-BiLSTM., , and . CSAI/ICIMT, page 447-450. ACM, (2018)Stream Mining of Frequent Patterns from Delayed Batches of Uncertain Data., and . DaWaK, volume 8057 of Lecture Notes in Computer Science, page 209-221. Springer, (2013)Brief Announcement: Exploration and Mitigation of Deafness Problems in Directional Antennas Based Wireless Ad-Hoc Networks., , and . SSS, volume 4280 of Lecture Notes in Computer Science, page 568-569. Springer, (2006)A User Cooperation Stimulating Strategy Based on Cooperative Game Theory in Cooperative Relay Networks., , and . EURASIP J. Wireless Comm. and Networking, (2009)FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability., , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 61-79. Springer, (2017)Depth from relative normal flows., and . Pattern Recognit., 23 (9): 1011-1022 (1990)