Author of the publication

High accuracy frequency offset correction with adjustable acquisition range in OFDM systems.

, , , , and . IEEE Trans. Wirel. Commun., 4 (1): 228-237 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster: Enhancing Remote Healthiness Attestation for Constrained IoT Devices., , , , and . ICNP, page 1-2. IEEE, (2020)LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data., , , , and . ACNS, volume 9092 of Lecture Notes in Computer Science, page 215-239. Springer, (2015)Decentralised event-triggered control for uncertain switched T-S fuzzy systems with asynchronous adaptive sampling communication., , , , and . Int. J. Syst. Sci., 51 (15): 2849-2867 (2020)TAP: A Traffic-Aware Probabilistic Packet Marking for Collaborative DDoS Mitigation., , , , , , and . MSN, page 470-478. IEEE, (2021)CNN-Based Chinese Character Recognition with Skeleton Feature., , , , , , and . ICONIP (5), volume 11305 of Lecture Notes in Computer Science, page 461-472. Springer, (2018)How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack., , , , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 269-287. Springer, (2017)EAP-ZKP: A Zero-Knowledge Proof based Authentication Protocol to Prevent DDoS Attacks at the Edge in Beyond 5G., , , , and . 5GWF, page 259-264. IEEE, (2021)Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage., , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 341-356. Springer, (2014)High accuracy frequency offset correction with adjustable acquisition range in OFDM systems., , , , and . IEEE Trans. Wirel. Commun., 4 (1): 228-237 (2005)From Mini House Game to Hobby-Driven Behavioral Biometrics-Based Password., , , , and . TrustCom/ISPA/IUCC, page 712-719. IEEE Computer Society, (2013)