From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks., , , , и . IEEE Trans. Inf. Forensics Secur., 12 (4): 825-839 (2017)Design in Power-Domain NOMA: Eavesdropping Suppression in the Two-User Relay Network with Compensation for the Relay User., , , , и . Mob. Networks Appl., 23 (4): 1068-1079 (2018)Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks., , , и . IEEE Trans. Ind. Informatics, 12 (1): 291-300 (2016)Polarization-Based Long-Range Communication Directional MAC Protocol for Cognitive Ad Hoc Networks., , и . IEICE Trans. Commun., 94-B (5): 1265-1275 (2011)A survey on dynamic spectrum access protocols for distributed cognitive wireless networks., , , и . EURASIP J. Wireless Comm. and Networking, (2012)Traffic-aware overload control scheme in 5G ultra-dense M2M networks., , , , и . Trans. Emerg. Telecommun. Technol., (2017)基于神经网络的软件质量评价综述 (Software Quality Evaluation Based on Neural Network: A Systematic Literature Review)., и . 计算机科学, 46 (11A): 507-516 (2019)Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement., , , , и . VTC Spring, стр. 1-5. IEEE, (2017)Outage Constrained Secrecy Rate Maximization for Relay Networks against Unknown Eavesdroppers., , , , и . WCNC, стр. 1-6. IEEE, (2017)Prediction based interference management and distributed trajectory regulation in amorphous cells., , , , , и . WCNC Workshops, стр. 299-304. IEEE, (2015)