Author of the publication

Physical layer authentication under intelligent spoofing in wireless sensor networks.

, , , , and . Signal Process., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Study of Construction and Analysis Method of Social Network Model Based on Cooperator Relationship., and . WEB, volume 108 of Lecture Notes in Business Information Processing, page 37-45. Springer, (2011)Construction and Implementation of Teaching Mode for Digital Mapping based on Interactive Micro-course Technology.. Int. J. Emerg. Technol. Learn., 13 (2): 21-32 (2018)Capacitor-Current-Feedback With Improved Delay Compensation for LCL-Type Grid-Connected Inverter to Achieve High Robustness in Weak Grid., , and . IEEE Access, (2022)Knowledge Base Population for Organization Mentions in Email., , and . AKBC@NAACL-HLT, page 24-28. The Association for Computer Linguistics, (2016)An Improved DBC-MPC Strategy for LCL-Filtered Grid-connected Inverters., , , , , , , and . IECON, page 1-6. IEEE, (2022)Combining Strategies for XML Retrieval., , , , and . INEX, volume 6932 of Lecture Notes in Computer Science, page 319-331. Springer, (2010)Combined CNN and LSTM for Motor Imagery Classification., , , , , and . CISP-BMEI, page 1-6. IEEE, (2019)Physical Layer Key Generation Scheme for Wideband Large Antenna Array Systems., , , and . BMSB, page 1-5. IEEE, (2022)A new indexing strategy for XML keyword search., , , , and . FSKD, page 2412-2416. IEEE, (2010)Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks., , , , and . IEEE Trans. Commun., 68 (1): 569-581 (2020)