Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Degrees-of-Freedom Regions for $K$-User MISO Time-Correlated Broadcast Channel., , and . CoRR, (2014)Game Theory Based Network Security., , , and . J. Information Security, 1 (1): 41-44 (2010)Children in the forest: towards a canonical problem of spatio-temporal collaboration., and . AAMAS, page 238. IFAAMAS, (2007)Linear Decision Fusion under the Control of Constrained PSO for WSNs., , , , and . IJDSN, (2012)A fictitious play-based response strategy for multistage intrusion defense systems., , , and . Secur. Commun. Networks, 7 (3): 473-491 (2014)On the Retrievability of Seismic Waves From High-Speed-Train-Induced Vibrations Using Seismic Interferometry., , , and . IEEE Geosci. Remote. Sens. Lett., (2022)The Coupling of Glacier Melt Module in SWAT+ Model Based on Multi-Source Remote Sensing Data: A Case Study in the Upper Yarkant River Basin., , , , and . Remote. Sens., 14 (23): 6080 (December 2022)Cooperative Wideband Spectrum Detection Based on Maximum Likelihood Ratio for CR Enhanced VANET., , , and . J. Commun., 8 (12): 814-821 (2013)Multi-Parameter-Setting Based on Data Original Distribution for DENCLUE Optimization., , , and . IEEE Access, (2018)From gratitude to injustice: Neurocomputational mechanisms of gratitude-induced injustice., , , , , , , , , and . NeuroImage, (2021)