Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach., , , and . IEEE Communications Letters, 19 (12): 2270-2273 (2015)Secure Cooperative Communication With Nondedicated Relays., , and . IEEE Trans. Vehicular Technology, 67 (8): 7811-7815 (2018)On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications., and . Sensors, 19 (5): 1158 (2019)Analysis of Temporal and Spatial Variation of Growing Season Drought in Jiling Province Based on Standardized Precipitation Evapotranspiration Index., , , , and . Agro-Geoinformatics, page 1-5. IEEE, (2019)Drought monitoring using MODIS derived perpendicular drought indexes., , , and . Agro-Geoinformatics, page 1-4. IEEE, (2019)Secure Secondary Communications with Curious Primary Users in Cognitive Underlay Networks., , , and . VTC Spring, page 1-5. IEEE, (2016)WiDraw: Enabling Hands-free Drawing in the Air on Commodity WiFi Devices., , , and . MobiCom, page 77-89. ACM, (2015)A distributed routing and time-slot assignment algorithm for cognitive radio ad hoc networks with primary-user protection., , , and . CHINACOM, page 470-474. IEEE, (2012)Classification of LiDAR Point Cloud based on Multiscale Features and PointNet., , , , and . IPTA, page 1-7. IEEE, (2018)Physical layer security based on real interference alignment in K-user MIMO Y wiretap channels., , , and . ICC Workshops, page 207-212. IEEE, (2016)