Author of the publication

A programmable baseband processor for massive MIMO uplink multi-user detection.

, , , , , and . ASICON, page 1-4. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced Security Authentication Based on Convolutional-LSTM Networks., , and . Sensors, 21 (16): 5379 (2021)Spatial-Spectral Total Variation-Regularized Low-Rank Tensor Representation for Hyperspectral Anomaly Detection., , , , , and . J. Circuits Syst. Comput., 33 (12): 2450216:1-2450216:21 (August 2024)Physical Layer Security of a Buffer-Aided Relay Selection for Underlay Cognitive Radio Network., , , and . CSPS (3), volume 517 of Lecture Notes in Electrical Engineering, page 999-1006. Springer, (2018)Channel Prediction-Based Security Authentication for Artificial Intelligence of Things., , , , and . Sensors, 23 (15): 6711 (August 2023)Machine Learning-Based Security Authentication for IoT Networks., , and . SGIoT, volume 354 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 106-115. Springer, (2020)Physical layer security in simultaneous wireless information and power transfer networks., , and . ISCIT, page 1-4. IEEE, (2017)Safeguarding multiuser communication using full-duplex jamming receivers., and . PIMRC, page 1-5. IEEE, (2017)Artificial Intelligence-Based Security Authentication: Applications in Wireless Multimedia Networks., , and . IEEE Access, (2019)A Learning Approach for Physical Layer Authentication Using Adaptive Neural Network., , and . IEEE Access, (2020)Wireless User Authentication Based on KLT and Gaussian Mixture Model., , , , , , and . WCNC, page 1-5. IEEE, (2019)