From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted., , , и . VTC Fall, стр. 1-5. IEEE, (2016)A proactive defense mechanism for mobile communication user data., , , и . Sci. China Inf. Sci., 61 (10): 109303:1-109303:3 (2018)Analysis of Abnormal Events in IMS and Research on the Strategy of Detection., , и . CIS, стр. 712-716. IEEE Computer Society, (2011)Secrecy analysis in D2D-enabled cellular networks against spatially random eavesdroppers., , , , и . WPMC, стр. 262-267. IEEE, (2016)Link Prediction Based on Information Preference Connection for Directed Network., , , и . SmartIoT, стр. 183-189. IEEE, (2020)Research on SSTI attack defense technology based on instruction set randomization., , , , и . ICAIIS, стр. 287:1-287:5. ACM, (2021)Secrecy Outage and Diversity Analysis in D2D-Enabled Cellular Networks., , , и . VTC Spring, стр. 1-5. IEEE, (2017)A Study on Networking Scheme of Indoor Visible Light Communication Networks., , , , и . VTC Spring, стр. 1-5. IEEE, (2014)Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet., , , , , и . IET Commun., 13 (2): 144-152 (2019)A Transmission Scheme for Encrypted Speech over GSM Network., , , и . ISCSCT (2), стр. 805-808. IEEE Computer Society, (2008)