Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Performance Analysis of Power Line Communication Networks Under Impulsive Noise in Smart Home., , , , , and . IEEE Access, (2018)Robust Synthesis Scheme for Secure Multi-Beam Directional Modulation in Broadcasting Systems., , , , and . IEEE Access, (2016)Feasible Frequency-domain Compensation Scheme for IQ Imbalances in OFDM Receivers, , , , and . CoRR, (2011)Performance analysis for a two-way relaying power line network with analog network coding., , , , , and . Frontiers Inf. Technol. Electron. Eng., 16 (10): 892-898 (2015)Resolution Limit of Positioning Error for Range-Free Localization Schemes., , , and . IEEE Syst. J., 14 (2): 2980-2989 (2020)A Parallel Inverse-Model-Based Iterative Learning Control Method for a Master-Slave Wafer Scanner., , , , and . IECON, page 41-46. IEEE, (2020)Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications., , , , , and . IEEE Trans. Signal Process., 67 (16): 4276-4290 (2019)Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications., , , , , and . CoRR, (2018)Efficient Receive Beamformers for Secure Spatial Modulation Against a Malicious Full-Duplex Attacker With Eavesdropping Ability., , , , , and . IEEE Trans. Veh. Technol., 70 (2): 1962-1966 (2021)High-Performance Estimation of Jamming Covariance Matrix for IRS-Aided Directional Modulation Network With a Malicious Attacker., , , , , , and . IEEE Trans. Veh. Technol., 71 (9): 10137-10142 (2022)