Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance improvement of transmission links in overlay cognitive radio through interference alignment., and . IWCIT, page 1-6. IEEE, (2016)Rate Analysis of Cell-Free Massive MIMO-NOMA With Three Linear Precoders., , , and . CoRR, (2019)Underlaid Spectrum Sharing for Cell-Free Massive MIMO-NOMA., , , and . IEEE Communications Letters, 24 (4): 907-911 (2020)TagIt: Tagging Network Flows using Blind Fingerprints., and . Proc. Priv. Enhancing Technol., 2017 (4): 290-307 (2017)Performance Analysis of Heterogeneous Cellular Caching Networks With Overlapping Small Cells., , , and . IEEE Trans. Veh. Technol., 71 (2): 1941-1951 (2022)Link Budget Analysis for Backscatter-Based Passive IoT., , , and . IEEE Access, (2022)Ambient IoT: Transmit Power Minimization for NOMA-Enabled BackCom., , , and . PIMRC, page 1-6. IEEE, (2023)Beamforming Design for NOMA-Assisted Symbiotic Backscatter., , , and . PIMRC, page 1-6. IEEE, (2023)Rate Enhancement for Distributed Massive MIMO Systems with Underlay Spectrum Sharing., , and . VTC Fall, page 1-5. IEEE, (2020)The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels., , , and . SecureComm (1), volume 335 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 152-171. Springer, (2020)