Author of the publication

A Physical Layer Encryption Scheme Based on Symbol Convolution for MISO Secure Transmission.

, , , and . ICCT, page 290-295. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fully Digital Driving Circuit for TFT LCD Using the Concept of Ramp-Stop., , , , , and . IEEE Trans. Ind. Electron., 66 (3): 2074-2080 (2019)Phatpackets for Data Transport within an HPC Network., and . IASTED PDCS, page 154-160. IASTED/ACTA Press, (2002)A Robust DPCC for IPMSM Based on a Full Parameter Identification Method., , , , , , and . IEEE Trans. Ind. Electron., 70 (8): 7695-7705 (August 2023)Corner detection using the point-to-centroid distance technique., , , , , and . IET Image Process., 14 (14): 3385-3392 (2020)Application of deep learning in civil engineering: boosting algorithms for predicting strength of concrete., , , , , and . J. Intell. Fuzzy Syst., 45 (5): 9109-9122 (November 2023)Seismic Data Denoising Based on DC-PCNN Image Fusion in NSCT Domain., , and . IEEE Geosci. Remote. Sens. Lett., (2024)Fault Detection of Permanent Magnet Synchronous Motor Based on Image Content Retrieval., , , , , , and . IEEE Trans. Instrum. Meas., (2022)Clustering With Orthogonal AutoEncoder., , , , , and . IEEE Access, (2019)BITS: A Binary Tree Based Web Service Composition System., , and . Int. J. Web Serv. Res., 4 (1): 40-58 (2007)Efficient algorithms based on centrality measures for identification of top-K influential users in social networks., , , , and . Inf. Sci., (2020)