Author of the publication

Supplementary Proof of Upper and Lower Bounds of Two-Way Opportunistic Amplify-and-Forward Relaying Channels.

, , and . IEEE Communications Letters, 18 (3): 401-402 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics., , , , , and . CoRR, (2024)Performance Analysis of Cognitive Cooperative Communication System Based on Optimal Relay Selection Scheme., , , and . J. Commun., 9 (7): 548-555 (2014)Poster: Noninvasive Respirator Fit Factor Inference by Semi-Supervised Learning., , , , , , and . CHASE, page 200-202. IEEE, (2023)How Can the Adversary Effectively Identify Cellular IoT Devices Using LSTM Networks?, , , , and . WiseML@WiSec, page 9-14. ACM, (2023)Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum Sensing., , , , , and . WiseML@WiSec, page 55-60. ACM, (2021)Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks., , , and . INFOCOM, page 1603-1611. IEEE, (2019)Cyber Deception for Computer and Network Security: Survey and Challenges., , and . CoRR, (2020)Performance Analysis of IQI Impaired Cooperative NOMA for 5G-Enabled Internet of Things., , , and . Wirel. Commun. Mob. Comput., (2020)Wireless Training-Free Keystroke Inference Attack and Defense., , , , , , and . IEEE/ACM Trans. Netw., 30 (4): 1733-1748 (2022)HoneyBreath: An Ambush Tactic Against Wireless Breath Inference., , , and . MobiQuitous, volume 492 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 203-226. Springer, (2022)