Author of the publication

Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization.

, , , and . IEEE Signal Process. Lett., 21 (7): 804-808 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel anti-jamming method in wireless sensor networks: Using artificial noise to actively interfere the intelligent jammer., and . ICSAI, page 954-959. IEEE, (2017)Enhanced MIMOME wiretap channel via adopting full-duplex MIMO radios., , and . GLOBECOM, page 3320-3325. IEEE, (2014)A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things., , , , , , and . IEEE Internet Things J., 9 (12): 9960-9972 (2022)MT-FlowFormer: A Semi-Supervised Flow Transformer for Encrypted Traffic Classification., , , , , and . KDD, page 2576-2584. ACM, (2022)Integrated Network Service to Enhance Multicast Communication., , , , , and . DASC, page 107-110. IEEE Computer Society, (2013)Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences., , , and . ACSAC, page 215-224. IEEE Computer Society, (2008)IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection., , and . PAKDD (3), volume 13282 of Lecture Notes in Computer Science, page 79-91. Springer, (2022)A New Scheme for Indirect Trust Calculation to Resist Bigmouth Attack in Wireless Ad Hoc Network., , , , , , , and . CSE, page 248-251. IEEE Computer Society, (2013)VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device., , , , , , , , and . ASE, page 1676-1687. IEEE, (2023)SFuzz: Slice-based Fuzzing for Real-Time Operating Systems., , , , , , , , , and 1 other author(s). CCS, page 485-498. ACM, (2022)