Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Complexity of Impossible Differential Cryptanalysis., , , , and . Secur. Commun. Networks, (2018)Energy-Efficient Probabilistic Area Coverage in Wireless Sensor Networks., , , , and . IEEE Trans. Veh. Technol., 64 (1): 367-377 (2015)Exploring density rectification and domain adaption method for crowd counting., , , , and . Neural Comput. Appl., 35 (4): 3551-3569 (February 2023)Probabilistic Semantic Communication over Wireless Networks with Rate Splitting., , , , , and . CoRR, (2024)Semantic Communication Approach for Multi-Task Image Transmission., , , and . VTC Fall, page 1-2. IEEE, (2022)Generative Model based Highly Efficient Semantic Communication Approach for Image Transmission., , , , , and . ICASSP, page 1-5. IEEE, (2023)The Model Inversion Eavesdropping Attack in Semantic Communication Systems., , , and . GLOBECOM, page 5171-5177. IEEE, (2023)Wireless Transmission of Images with the Assistance of Multi-level Semantic Information., , , , and . ISWCS, page 1-6. IEEE, (2022)Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR., , , and . NSS, volume 9955 of Lecture Notes in Computer Science, page 398-411. Springer, (2016)Comparison of two Models Used to Describe the Ankle Torque in Response to Functional Electrical Stimulation., , , and . ICARM, page 894-898. IEEE, (2019)