Author of the publication

Secrecy Profits Analysis of Wireless-Powered Networks Against Randomly Distributed Eavesdroppers.

, , , and . ICC, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Networking Support for Bidirectional Cross-Technology Communication., , , , , , and . IEEE Trans. Mob. Comput., 20 (1): 204-216 (2021)A Cloud-Based Trust Model for Evaluating Quality of Web Services., , , and . J. Comput. Sci. Technol., 25 (6): 1130-1142 (2010)Emotion recognition with multimodal features and temporal models., , , , , , and . ICMI, page 598-602. ACM, (2017)Analysis of the sphericalwave truncation error for spherical harmonic soundfield expansions., , and . ICASSP, page 5-8. IEEE, (2012)An improved exponential model for predicting the remaining useful life of lithium-ion batteries., , , , , and . ICPHM, page 1-6. IEEE, (2015)Querying Policies Based on Sparse Matrices for Noisy 20 Questions., , , , and . ISIT, page 2409-2413. IEEE, (2019)Parallel Crime Scene Analysis Based on ACP Approach., , , , , and . IEEE Trans. Comput. Social Systems, 5 (1): 244-255 (2018)Some facts you may want to know about water-filling solutions., , , , and . ICCC, page 1-6. IEEE, (2017)First-episode depression: Diffusion tensor imaging of deep white matter., , , , , , and . ICSAI, page 901-905. IEEE, (2014)1-to-Many and many-to-1 communication in hybrid wireless network-on-chip., and . ICECS, page 497-500. IEEE, (2013)