Author of the publication

Security Region Analysis with Artificial Noise Based on Secrecy Outage Probability.

, , , , and . MILCOM, page 336-340. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synchronization control of recurrent neural networks with distributed delays, , and . Physica A: Statistical Mechanics and its Applications, 387 (4): 982--996 (Feb 1, 2008)Concentric gravity waves in the mesosphere generated by deep convective plumes in the lower atmosphere near Fort Collins, Colorado, , , , , , , , , and . J. Geophys. Res., (03 2009/03/18)Factors in automatic musical genre classification, and . IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, (2003)An integrated framework on mining logs files for computing system management., , , and . KDD, page 776-781. ACM, (2005)Soft Fusion with Second-Order Uncertainty Based on Vague Set., and . ITITS (1), volume 454 of Advances in Intelligent Systems and Computing, page 139-145. (2015)The Queue Length of a GI M 1 Queue with Set Up Period and Bernoulli Working Vacation Interruption. INTERNATIONAL JOURNAL OF TREND IN SCIENTIFIC RESEARCH AND DEVELOPMENT, 5 (5): 72-76 (August 2021)Locally-Aware Constrained Games on Networks., , , , and . CoRR, (2020)Robust consensus control in networks of agents with singular systems., , , and . ICCA, page 2115-2119. IEEE, (2010)Chaos Synchronization Between Unified Chaotic System and Genesio System., , and . ISNN (2), volume 4492 of Lecture Notes in Computer Science, page 8-15. Springer, (2007)An Immune-Based Real-Time Quantitative Detection for Threat Change of Cyberspace Digital Virtual Assets., , , , , and . EECS, page 76-81. IEEE, (2019)