From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Artificial Noise-Aided User Scheduling From the Perspective of Secrecy Outage Probability., , и . IEEE Trans. Vehicular Technology, 67 (8): 7816-7820 (2018)An Opportunistic Power Control Scheme for Mitigating User Location Tracking Attacks in Cellular Networks., , , и . IEEE Trans. Inf. Forensics Secur., (2022)Adaptive Proportional Fairness Scheduling for SWIPT-Enabled Multicell Downlink Networks., , , и . WCNC, стр. 1-6. IEEE, (2019)Aggregate throughput maximization in a hierarchical cooperation scheme under consideration of packet arrival rate, control and data overhead., , , , и . WCNC, стр. 422-427. IEEE, (2013)Artificial Noise-Aided User Scheduling for Optimal Secrecy Multiuser Diversity., , и . IEEE Communications Letters, 21 (3): 528-531 (2017)Access Priority Provisioning Based on Random Access Parallelization for Prioritized Cellular IoT., , , и . IEEE Access, (2021)On the Effect of Malicious User on D2D Cluster: CSI Forgery and Countermeasures., , , и . IEEE Access, (2023)An Enhanced PRACH Preamble Detector for Cellular IoT Communications., , и . IEEE Communications Letters, 21 (12): 2678-2681 (2017)SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information (Extended Version)., , , , и . CoRR, (2019)Deep learning approach for physical-layer security in Gaussian multiple access wiretap channel., , и . ICT Express, 9 (4): 728-733 (августа 2023)