Author of the publication

An Energy-constrained Cooperative Jamming Scheme for Wireless Security Communication in Power IoT.

, , , , , and . VTC2023-Spring, page 1-5. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on gesture recognition of smart data fusion features in the IoT., , , , , and . Neural Comput. Appl., 32 (22): 16917-16929 (2020)Consensus of networked multi-agent systems via the networked predictive control and relative outputs., and . J. Frankl. Inst., 349 (7): 2343-2356 (2012)Adaptive sliding-mode-based control for stochastic nonlinear systems subject to probabilistic interval delay: A delay-fractioning method., , , , and . J. Frankl. Inst., 357 (2): 1002-1025 (2020)Image Segmentation Technology Based on Genetic Algorithm., , , , , and . ICDSP, page 27-31. ACM, (2019)Semantic segmentation for multiscale target based on object recognition using the improved Faster-RCNN model., , , , , and . Future Gener. Comput. Syst., (2021)Global Consensus of High-Order Discrete-Time Multi-Agent Systems with Communication Delay and Saturation Constraint., , and . Sensors, 22 (3): 1007 (2022)Viewpoint Quality Evaluation for Augmented Virtual Environment., , , and . PCM (3), volume 11166 of Lecture Notes in Computer Science, page 223-234. Springer, (2018)Group Leader-Following Consensus Control for Heterogeneous Multi-Agent Systems With Time Delays., , and . IEEE Access, (2021)Traffic offloading based on content sharing in D2D for Smart Grid., , , , , and . ICCNS, page 185-190. ACM, (2022)Smart Contract Vulnerability Detection Based on Critical Combination Path and Deep Learning., , , and . ICCNS, page 219-226. ACM, (2022)