Author of the publication

Covert Threat Region Analysis of 3-D Location-Based Beamforming in Rician Channel.

, , , , and . IEEE Wirel. Commun. Lett., 11 (6): 1253-1257 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensembled Tricks for Instance Segmentation., , , , , and . IWCMC, page 1418-1421. IEEE, (2020)Valuation of credit contingent interest rate swap., and . Risk Decis. Anal., 4 (1): 39-46 (2013)Multi-dimensional data visualisation method based on convex-corrected Radviz., , , , , and . Int. J. Comput. Appl. Technol., 63 (1/2): 114-124 (2020)Weighted pseudo almost periodic functions and applications to evolution equations with delay., , and . Appl. Math. Comput., 219 (17): 8949-8958 (2013)Secret key generation based on private pilot under man-in-the-middle attack., , , , and . Sci. China Inf. Sci., 60 (10): 100307:1-100307:14 (2017)trieFinder: an efficient program for annotating digital gene expression (DGE) tags., , , , and . BMC Bioinform., (2014)Understanding overlay characteristics of a large-scale peer-to-peer IPTV system., , , and . ACM Trans. Multim. Comput. Commun. Appl., 6 (4): 31:1-31:24 (2010)A comparison principle for nonlocal coupled systems of fully nonlinear parabolic equations., , and . Appl. Math. Lett., 19 (11): 1272-1277 (2006)Global attractors for semilinear hyperbolic equations, , and . Chaos, Solitons & Fractals, 37 (4): 1040--1047 (August 2008)Dsa-PAML: a parallel automated machine learning system via dual-stacked autoencoder., , , , , , and . Neural Comput. Appl., 34 (15): 12985-13006 (2022)