Author of the publication

Secure Energy Harvesting Communications with Relay Selection over Nakagami-m Fading Channels.

, , , , and . Mob. Networks Appl., 23 (6): 1555-1562 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secrecy Performance Analysis of Heterogeneous Networks With Unreliable Wireless Backhaul and Imperfect Channel Estimation., , , , , and . IEEE Trans. Veh. Technol., 72 (7): 9221-9236 (July 2023)Transformation of organic sulfur and its functional groups in nantong and laigang coal under microwave irradiation., , , , , , , , , and . J. Comput. Chem., 40 (31): 2749-2760 (2019)Navigating Open Set Scenarios for Skeleton-based Action Recognition., , , , , , , , , and . CoRR, (2023)Energy-Efficient and Throughput Fair Resource Allocation for TS-NOMA UAV-Assisted Communications., , , , , and . IEEE Trans. Commun., 68 (11): 7156-7169 (2020)Performance analysis of Cognitive Vehicular Networks under Unreliable Backhaul., , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 8 (26): e4 (2021)An extensible approach for real-time bidding with model-free reinforcement learning., , , , , and . Neurocomputing, (2019)A Hybrid Iterative Thresholding Method for Solving Sparsity-Regularized Linear Inverse Problems and Its Application in Seismic Sparse-Spike Deconvolution., , and . IEEE Geosci. Remote. Sens. Lett., (2023)Hilbert-Huang Transform Incorporating Analytical Mode Decomposition and Its Application in Fractured-Vuggy Carbonate Reservoir Prediction., , , and . IEEE Geosci. Remote. Sens. Lett., (2023)Design of a Multi-user Collaborative Innovation Digital Resource Library for Miao Embroidery., , , and . HCI (24), volume 14034 of Lecture Notes in Computer Science, page 17-26. Springer, (2023)UAV-Assisted Downlink-and-Uplink Communication in the Presence of Multiple Malicious Jammers., , , , and . WCNC, page 1-6. IEEE, (2023)