Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Network Robustness via Shielding., , and . IEEE/ACM Trans. Netw., 25 (4): 2209-2222 (2017)Robustness of Interdependent Random Geometric Networks., , and . IEEE Trans. Netw. Sci. Eng., 6 (3): 474-487 (2019)Design of Reconfigurable Intelligent Surfaces for Wireless Communication: A Review., , , , , , , , , and . CoRR, (2023)TRTAR: Transmissive RIS-assisted Through-the-wall Human Activity Recognition., , , , and . CoRR, (2024)Connectivity in Interdependent Networks., and . CoRR, (2017)Parallel adaptive event-triggered asynchronous control for two-time-scale fuzzy semi-Markov jump systems under deception attacks., , , and . J. Frankl. Inst., 360 (17): 12941-12968 (November 2023)Efficient Generalized Engset Blocking Calculation., and . IEEE Communications Letters, 18 (9): 1535-1538 (2014)An Efficient Distributed Multivehicle Cooperative Tracking Framework via Multicast., , , , and . IEEE Internet Things J., 11 (1): 158-173 (January 2024)Comparative study of microgrid optimal scheduling under multi-optimization algorithm fusion., , , , and . CoRR, (2023)LSGAN-AT: enhancing malware detector robustness against adversarial examples., , , , and . Cybersecur., 4 (1): 38 (2021)