Author of the publication

The Secrecy Capacity Optimization Artificial Noise: A New Type of Artificial Noise for Secure Communication in MIMO System.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence of Microcultural Information Flow on the Value Education in American Universities and its Countermeasures.. CIPAE, page 386-392. ACM, (2020)Transcriptomics and Proteomics in the Study of H1N1 2009., , , , and . Genom. Proteom. Bioinform., 8 (3): 139-144 (2010)Cryptanalysis of an integrity checking scheme for cloud data sharing., , , , and . J. Inf. Secur. Appl., (2015)New Stability Criteria of Discrete Systems With Time-Varying Delays., , , , , and . IEEE Access, (2019)A Puncturing Algorithm for Mixing 2-Kernel and 3-Kernel Polar Codes., , , , and . WISATS (2), volume 281 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 323-332. Springer, (2019)Free gait generation based on discretization for a hexapod robot., , , and . ROBIO, page 2334-2338. IEEE, (2013)一种基于像素梯度信息的背景减除法 (Background Subtraction Based on Local Gradient Feature)., , and . 计算机科学, 42 (8): 300-304 (2015)"Doctors Do Too Little Technology": A Longitudinal Field Study of an Electronic Healthcare System Implementation., , and . Inf. Syst. Res., 22 (3): 523-546 (2011)智能主体的等级BDI(信念、愿望和意图)模型 (Graded Belief-Desire-Intention (BDI) Models for Agent Architectures)., , and . 计算机科学, 43 (7): 35-40 (2016)Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC., , , , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 397-415. Springer, (2019)