Author of the publication

Vulnerability analysis and verification for LTE initial synchronization mechanism.

, , , and . Sarnoff Symposium, page 150-154. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reduced-complexity IBDFE for faster-than-Nyquist communication systems., , , , and . MILCOM, page 654-659. IEEE, (2016)Iterative Visual Relationship Detection via Commonsense Knowledge Graph., , , , , and . JIST, volume 12032 of Lecture Notes in Computer Science, page 210-225. Springer, (2019)Modeling and characterization of non-ideal effects in high-performance RF MEMS tuners. Purdue University, USA, (2014)Vulnerability analysis and verification for LTE initial synchronization mechanism., , , and . Sarnoff Symposium, page 150-154. IEEE, (2015)Lattice-Boltzmann-Method-Based Numerical Simulation for Heavy Metal Migration Process during Deep-Sea Mining., , , , , , and . Symmetry, 16 (5): 557 (May 2024)The optimal approximation solution associated with a nonnegative definite constraint matrix equation., and . ICMLC, page 117-121. IEEE, (2010)A secure OFDM transmission scheme based on chaos mapping., , , and . IPCCC, page 1-6. IEEE Computer Society, (2015)Research of acquisition method for pavement surface texture based on photometric stereo techniques., , , , and . ITSC, page 1596-1601. IEEE, (2014)Accessing the applicability of polarized protein-specific charge in linear interaction energy analysis., , , and . J. Comput. Chem., 35 (9): 737-747 (2014)A numerically stable restrained electrostatic potential charge fitting method., , , and . J. Comput. Chem., 34 (10): 847-853 (2013)