Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring simultaneous keyword and key sentence extraction: improve graph-based ranking using wikipedia., , , and . CIKM, page 2619-2622. ACM, (2012)Exploiting idle register classes for fast spill destination., , , , and . ICS, page 319-326. ACM, (2008)Simulation study of TCP behavior over redundant source routing in ad hoc networks., , , and . WCNC, page 1258-1263. IEEE, (2004)Mining phase evolution for hot topics: A case study from multiple social media platforms., , , , , and . SMC, page 2814-2819. IEEE, (2017)Impact of channel estimation errors in amplify-and-forward two-way relaying system., , , and . WCSP, page 1-5. IEEE, (2011)Low-Light Image Enhancement with Attention and Multi-level Feature Fusion., , , , and . ICME Workshops, page 276-281. IEEE, (2019)Physical layer security in D2D communication system underlying cellular networks., , , , and . WCSP, page 1-5. IEEE, (2017)Mobility-based Physical-layer Key Generation Scheme for D2D Communications Underlaying Cellular Network., , , , and . WCSP, page 1-5. IEEE, (2018)Social-aware file-sharing mechanism for device-to-device communications., , , and . WCSP, page 1-5. IEEE, (2015)Association analysis and prediction for IPTV service data and user's QoE., , , and . WCSP, page 1-5. IEEE, (2015)