Author of the publication

Intelligent Reflecting Surface-Assisted Secret Key Generation In Multi-antenna Network.

, , , , and . CoRR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bridge extraction based on on constrained Delaunay triangulation for panchromatic image., , and . IGARSS, page 1429-1432. IEEE, (2011)On the generalized large set of Kasami sequences., , and . Appl. Algebra Eng. Commun. Comput., 21 (6): 417-441 (2010)Two new permutation polynomials with the form (x2k+x+d)s+x over F2n., , and . Appl. Algebra Eng. Commun. Comput., 21 (2): 145-150 (2010)Implementation of Cryptosystems Based on Tate Pairing., , and . J. Comput. Sci. Technol., 20 (2): 264-269 (2005)New Optimal frequency Hopping sequence Sets from Balanced Nested difference Packings of Partition-Type., , , and . Int. J. Found. Comput. Sci., 24 (4): 533- (2013)Boolean functions with four-valued Walsh spectra., and . J. Systems Science & Complexity, 28 (3): 743-754 (2015)Several Classes of Boolean Functions with Four-Valued Walsh Spectra., and . Int. J. Found. Comput. Sci., 28 (4): 357-378 (2017)Salient object detection based on discriminative boundary and multiple cues integration., , , , , and . J. Electronic Imaging, 25 (1): 013019 (2016)A Novel Approach for Blood Vessel Edge Detection in Retinal Images., , , , , , and . BMEI, page 1-4. IEEE, (2009)Cryptanalysis of countermeasures against multiple transmission attacks on NTRU., , , and . IET Commun., 8 (12): 2142-2146 (2014)