From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploring the Pan-Relationship Between Disease and Symptom Related to Coronary Heart Disease from Chinese Electronic Medical Records., , , und . ICIC (3), Volume 11645 von Lecture Notes in Computer Science, Seite 235-243. Springer, (2019)Fundamental Tradeoffs in Uplink Grant-Free Multiple Access with Protected CSI., , , und . CoRR, (2019)Double differential transmission for two-way relay systems with unknown carrier frequency offsets., , und . ICASSP, Seite 3148-3151. IEEE, (2015)Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks., , , und . IEEE Trans. Ind. Informatics, 12 (1): 291-300 (2016)Polarization-Based Long-Range Communication Directional MAC Protocol for Cognitive Ad Hoc Networks., , und . IEICE Trans. Commun., 94-B (5): 1265-1275 (2011)A survey on dynamic spectrum access protocols for distributed cognitive wireless networks., , , und . EURASIP J. Wireless Comm. and Networking, (2012)Traffic-aware overload control scheme in 5G ultra-dense M2M networks., , , , und . Trans. Emerg. Telecommun. Technol., (2017)基于神经网络的软件质量评价综述 (Software Quality Evaluation Based on Neural Network: A Systematic Literature Review)., und . 计算机科学, 46 (11A): 507-516 (2019)Signal Conversion: Combat Eavesdropping for Physical Layer Security Improvement., , , , und . VTC Spring, Seite 1-5. IEEE, (2017)Outage Constrained Secrecy Rate Maximization for Relay Networks against Unknown Eavesdroppers., , , , und . WCNC, Seite 1-6. IEEE, (2017)