Author of the publication

Security enhancement in cooperative jamming using compromised secrecy region minimization.

, , and . CWIT, page 214-218. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Long-Lasting Nanophosphors Applied to UV-Resistant and Energy Storage Perovskite Solar Cells, , , , , , , , , and . Advanced Energy Materials, (2017)A Mixed Parallel Perceptron Classifier and Several Application problems., , and . IJCNN, page 4797-4802. IEEE, (2006)Pruning Filters for Efficient ConvNets., , , , and . ICLR (Poster), OpenReview.net, (2017)Semi-Supervised Change Detection Based on Graphs with Generative Adversarial Networks., , , , , , and . IGARSS, page 74-77. IEEE, (2019)Secure Transmission in OFDM Systems by Using Time Domain Scrambling., , and . VTC Spring, page 1-5. IEEE, (2013)Energy-Spectral Efficiency Tradeoff of Downlink NOMA System with Fairness Consideration., , , and . VTC Spring, page 1-5. IEEE, (2018)Design of instruction decode logic for dual-issue superscalar processor based on LEON2., , , , and . ICCE-Berlin, page 1-4. IEEE, (2013)Spectrum sensing with energy detection in cognitive Vehicular Ad hoc Networks., and . WiVeC, page 1-5. IEEE, (2014)Detection of GPS spoofing through signal multipath signature analysis., and . CCECE, page 1-5. IEEE, (2016)Segmentation of Rapeseed Color Drone Images Using K-Means Clustering., , , and . CSAE, page 107:1-107:4. ACM, (2019)