Author of the publication

Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach.

, , , and . IEEE Communications Letters, 19 (12): 2270-2273 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Backup sourcing with capacity reservation under uncertain disruption risk and minimum order quantity., , and . Comput. Ind. Eng., (2017)A distributed routing and time-slot assignment algorithm for cognitive radio ad hoc networks with primary-user protection., , , and . CHINACOM, page 470-474. IEEE, (2012)Generative Localization With Uncertainty Estimation Through Video-CT Data for Bronchoscopic Biopsy., , , and . IEEE Robotics Autom. Lett., 5 (1): 258-265 (2020)Multi-Model Feedforward Dynamic Matrix Control of Polymer Membrane Fuel Cell with Dead-Ended Anode and Cyclic Purge Process., , , and . CCTA, page 710-715. IEEE, (2018)Physical Layer Security Improvement by Constellation Selection and Artificial Interference., , , , and . WCNC, page 1-6. IEEE, (2017)Jamming or Forwarding? Full-Duplex Relaying for Physical Layer Security., , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2016)Buffering-aided resource allocation for Type I relay in LTE-Advanced cellular networks., , , , and . GLOBECOM, page 4484-4489. IEEE, (2014)Discriminative Clip Mining for Video Anomaly Detection., , , , and . ICIP, page 2121-2125. IEEE, (2020)Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach., , , and . IEEE Communications Letters, 19 (12): 2270-2273 (2015)WiDraw: Enabling Hands-free Drawing in the Air on Commodity WiFi Devices., , , and . MobiCom, page 77-89. ACM, (2015)