Author of the publication

Physical Layer Security Enabled Two-Stage AP Selection for Computation Offloading.

, , , , and . GLOBECOM, page 31-36. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Static Analysis of Wearable Lower Extremity Exoskeleton Based on ANSYS Workbench., , , , and . MSN, page 510-514. IEEE Computer Society, (2013)Design of Strong Signal Masking Covert Communication Transmission Scheme Based on OFDM System., and . ICCT, page 169-173. IEEE, (2019)Energy-efficient data dissemination strategy for roadside infrastructure in VCPS., , , , and . EURASIP J. Wireless Comm. and Networking, (2016)Preventing Eavesdropper by Artificial Noise in MIMO-OFDM Systems., , , and . Wireless Personal Communications, 99 (3): 1103-1121 (2018)An Abnormal Login Detection Method Based on Multi-source Log Fusion Analysis., , , , , and . ICBK, page 229-235. IEEE, (2019)Construction of virtual experiment platform for research about vehicle driving control at energy-saving., , and . CSCWD, page 427-431. IEEE, (2010)A simple multi-symbol detector for CPM signals., , , , and . WCSP, page 1-4. IEEE, (2013)Does software reliability growth behavior follow a non-homogeneous Poisson process., , , , and . Inf. Softw. Technol., 50 (12): 1232-1247 (2008)Effectively Linking Persons on Cameras and Mobile Devices on Networks., , , , , and . IEEE Internet Comput., 23 (4): 18-26 (2019)TORA: A Truthful Online Reverse Auction Scheme for Access Permission Transaction in Macro-Femtocell Networks., , , , , and . Ad Hoc Sens. Wirel. Networks, 28 (3-4): 347-362 (2015)