Author of the publication

Physical Layer Secrecy Performance of RF-EH Networks with Multiple Eavesdroppers.

, , , and . J. Inform. and Commun. Convergence Engineering, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cooperation in NOMA networks under limited user-to-user communications: Solution and analysis., , , and . WCNC, page 1-5. IEEE, (2018)Performance Analysis of Two-Way Relaying System with RF-EH and Multiple Antennas., , , , and . VTC Fall, page 1-5. IEEE, (2016)Cognitive Fixed-Gain Amplify-and-Forward Relay Networks under Interference Constraints., , , and . IEICE Trans. Commun., 96-B (1): 375-378 (2013)Secrecy Performance Analysis and Optimization for UAV-Relay-Enabled WPT and Cooperative NOMA MEC in IoT Networks., , , , , and . IEEE Access, (2023)Physical Layer Secrecy Enhancement for Non-orthogonal Multiple Access Cooperative Network with Artificial Noise., and . INISCOM, volume 293 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 81-98. Springer, (2019)Performance Analysis on Wireless Power Transfer Wireless Sensor Network with Best AF Relay Selection over Nakagami-m Fading., , , and . INISCOM, volume 293 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 193-204. Springer, (2019)Performance Analysis of Relay Selection on Cooperative Uplink NOMA Network with Wireless Power Transfer., , , , and . INISCOM, volume 334 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 32-44. Springer, (2020)Performance Analysis and Optimization for IoT Mobile Edge Computing Networks With RF Energy Harvesting and UAV Relaying., , , , , and . IEEE Access, (2022)Time Reversal SWIPT Networks with an Active Eavesdropper: SER-Energy Region Analysis., , , , and . VTC Fall, page 1-5. IEEE, (2016)Secure Cognitive Reactive Decode-and-Forward Relay Networks: With and Without Eavesdropper., , , and . Wireless Personal Communications, 85 (4): 2619-2641 (2015)