Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relay Selection Algorithm for Cognitive Relay Network., , , and . Wireless Personal Communications, 96 (4): 6183-6195 (2017)Enhancement of VPN Authentication Using GPS Information with Geo-Privacy Protection., , and . ICCCN, page 1-6. IEEE, (2016)Opportunistic Cooperative QoS Guarantee Protocol Based on GOP-length and Video Frame-diversity for Wireless Multimedia Sensor Networks., and . J. Inf. Hiding Multim. Signal Process., 7 (2): 254-265 (2016)LEACH-TLC: a strategy of reducing and uniform energy consumption based on target location constraint., , , , and . IET Wirel. Sens. Syst., 9 (6): 347-357 (2019)Learning Transferable Driven and Drone Assisted Sustainable and Robust Regional Disease Surveillance for Smart Healthcare., , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 18 (1): 114-125 (2021)Analysis of DNS TXT Record Usage and Consideration of Botnet Communication Detection., , and . IEICE Trans. Commun., 101-B (1): 70-79 (2018)Application and Performance Optimization of MapReduce Model in Image Segmentation., , , , , and . IEEE Access, (2020)Weighted Conflict Evidence Combination Method Based on Hellinger Distance and the Belief Entropy., , , , and . IEEE Access, (2020)Physical layer security transmission scheme based on artificial noise in cooperative SWIPT NOMA system., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 144 (2021)Incorporating Positional Information into Deep Belief Networks for Sentiment Classification., , and . ICDM, volume 10357 of Lecture Notes in Computer Science, page 1-15. Springer, (2017)