Author of the publication

On physical-layer security for primary system in underlay cognitive radio networks.

, , , , , and . IET Networks, 7 (2): 68-73 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Bio-inspired Multidimensional Network Security Model., , , and . IMSCCS (2), page 3-7. IEEE Computer Society, (2006)0-7695-2581-4.A Computer Immune System: LAN Immune System Model based on Host (LISMH)., and . IMSCCS (2), page 207-211. IEEE Computer Society, (2006)0-7695-2581-4.Chinese Text Feature Dimension Reduction Based on Semantics., , , and . CLSW, volume 8229 of Lecture Notes in Computer Science, page 396-405. Springer, (2013)B-iTRF: A novel bio-inspired trusted routing framework for wireless sensor networks., , , , , and . WCNC, page 2242-2247. IEEE, (2014)Network Security Situation Evaluation Strategy Based on Cloud Gravity Center Judgment., , , , and . J. Networks, 9 (2): 283-290 (2014)MPCE: A Maximum Probability Based Cross Entropy Loss Function for Neural Network Classification., , , , , and . IEEE Access, (2019)A randomized block policy gradient algorithm with differential privacy in Content Centric Networks., , , , , and . Int. J. Distributed Sens. Networks, 17 (12): 155014772110599 (2021)Latency-Optimal Computational Offloading Strategy for Sensitive Tasks in Smart Homes., , , , and . Sensors, 21 (7): 2347 (2021)On physical-layer security for primary system in underlay cognitive radio networks., , , , , and . IET Networks, 7 (2): 68-73 (2018)A Component Assembly Approach to Support Human-computer Interface Construction., , , and . J. Softw., 6 (11): 2189-2195 (2011)