Author of the publication

An Asynchronous Massive Access Scheme with Dynamic Range Considerations.

, and . ISIT, page 2009-2014. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the application of the multi-agent-based robot system in book classification for library., , , and . ICNC, page 4109-4113. IEEE, (2010)Detecting Microblogger's Attitude towards Bursty Events: A Text Chain Model., , and . J. Softw., 9 (5): 1163-1169 (2014)Energy-Efficient Resource Allocation and Subchannel Assignment for NOMA-Enabled Multiaccess Edge Computing., , , and . IEEE Syst. J., 16 (1): 1558-1569 (2022)Adaptive backstepping-based fuzzy tracking control scheme for output-constrained nonlinear switched lower triangular systems with time-delays., , and . Neurocomputing, (2016)HR-Depth: High Resolution Self-Supervised Monocular Depth Estimation., , , , , , , and . CoRR, (2020)Non-Intrusive Load Monitoring Method Considering the Time-Segmented State Probability., , , , , , and . IEEE Access, (2022)Latency Optimization for Computation Offloading With Hybrid NOMA-OMA Transmission., , , and . IEEE Internet Things J., 8 (8): 6677-6691 (2021)Automatic skin lesion classification based on mid-level feature learning., , , and . Comput. Medical Imaging Graph., (2020)Design of Coal Mine Monitoring System Based on Internet of Things., and . BIC-TA, volume 472 of Communications in Computer and Information Science, page 289-294. Springer, (2014)A Method for Discovering Hidden Patterns of Cybersecurity Knowledge Based on Hierarchical Clustering., , , , , and . DSC, page 334-338. IEEE, (2021)