Author of the publication

Exploiting adaptive modulation in E-band software-defined backhaul network.

, , , , and . CCWC, page 1009-1013. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rejection of Multitone Jamming for FFH/MFSK Spread-Spectrum Systems over Frequency-Selective Rayleigh-Fading Channels., , and . VTC Spring, page 688-692. IEEE, (2008)Combinational Logic Binding for FPGA System Security.. Trustcom/BigDataSE/ISPA, page 216-223. IEEE, (2016)Error probability analysis of FFH/MFSK receivers over frequency-selective Rician-fading channels with partial-band-noise jamming., , and . IEEE Trans. Commun., 57 (10): 2880-2885 (2009)Performance of Space-Code-Division Multiple-Access Systems Using Reduced-Rank Detection., and . VTC Spring, page 1688-1692. IEEE, (2007)The dynamic relaxation form finding method aided with advanced recurrent neural network., , , and . CAAI Trans. Intell. Technol., 8 (3): 635-644 (September 2023)SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android., , , , and . CoRR, (2020)Adversarial Examples: Attacks on Machine Learning-based Malware Visualization Detection Methods., , , and . CoRR, (2018)APMSA: Adversarial Perturbation Against Model Stealing Attacks., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)A novel method for malware detection on ML-based visualization technique., , , and . Comput. Secur., (2020)SoK: Rowhammer on Commodity Operating Systems., , , , , , , , , and 1 other author(s). AsiaCCS, ACM, (2024)