Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fundamental Tradeoffs in Uplink Grant-Free Multiple Access with Protected CSI., , , and . CoRR, (2019)Exploring the Pan-Relationship Between Disease and Symptom Related to Coronary Heart Disease from Chinese Electronic Medical Records., , , and . ICIC (3), volume 11645 of Lecture Notes in Computer Science, page 235-243. Springer, (2019)Double differential transmission for two-way relay systems with unknown carrier frequency offsets., , and . ICASSP, page 3148-3151. IEEE, (2015)Power optimization for FPRM logic using approximate computing technique., and . ASICON, page 1-4. IEEE, (2019)Design in Power-Domain NOMA: Eavesdropping Suppression in the Two-User Relay Network with Compensation for the Relay User., , , , and . Mob. Networks Appl., 23 (4): 1068-1079 (2018)Matching Theory-Based Cooperative Secure Transmission Strategy for Social-Aware D2D Communications., and . IEEE Trans. Veh. Technol., 68 (10): 10289-10294 (2019)软件系统故障传播模型研究进展 (Research Progress on Error Propagation Model in Software System)., and . 计算机科学, 43 (6): 1-9 (2016)Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (4): 825-839 (2017)基于神经网络的软件质量评价综述 (Software Quality Evaluation Based on Neural Network: A Systematic Literature Review)., and . 计算机科学, 46 (11A): 507-516 (2019)Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement., , , , and . VTC Spring, page 1-5. IEEE, (2017)