Author of the publication

Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission.

, , , and . IEEE Trans. Vehicular Technology, 67 (6): 5486-5490 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systems biology: The cost of feedback control, and . Nature, 467 (7312): 163--164 (Sep 9, 2010)information to Intelligence(itoI): An Adaptive and Intelligent Prototype of Knowledge Construction for College Student., , , , , , and . ICCSE, page 2:1-2:4. ACM, (2018)Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback., and . IEEE Trans. Vehicular Technology, 68 (1): 740-753 (2019)Study on Medical Image Report Generation Based on Improved Encoding-Decoding Method., , , and . ICIC (1), volume 11643 of Lecture Notes in Computer Science, page 686-696. Springer, (2019)Grad-Cam Guided Progressive Feature CutMix for Classification., , and . CoRR, (2020)Learning Posterior and Prior for Uncertainty Modeling in Person Re-Identification., , , and . CoRR, (2020)Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (4): 825-839 (2017)Design in Power-Domain NOMA: Eavesdropping Suppression in the Two-User Relay Network with Compensation for the Relay User., , , , and . Mob. Networks Appl., 23 (4): 1068-1079 (2018)Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks., , , and . IEEE Trans. Ind. Informatics, 12 (1): 291-300 (2016)Traffic-aware overload control scheme in 5G ultra-dense M2M networks., , , , and . Trans. Emerg. Telecommun. Technol., (2017)