Author of the publication

Secure Cooperative Systems with Jamming and Unreliable Backhaul over Nakagami-m Fading Channels.

, , , , and . INISCOM, volume 257 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 253-263. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A SVM Regression Based Approach to Filling in Missing Values., , , , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 581-587. Springer, (2005)UTFNet: Uncertainty-Guided Trustworthy Fusion Network for RGB-Thermal Semantic Segmentation., , , , and . IEEE Geosci. Remote. Sens. Lett., (2023)Social-Aware Spectrum Sharing and Caching Helper Selection Strategy Optimized Multicast Video Streaming in Dense D2D 5G Networks., , , , , and . IEEE Syst. J., 15 (3): 3480-3491 (2021)Navigating Open Set Scenarios for Skeleton-Based Action Recognition., , , , , , , , , and . AAAI, page 4487-4496. AAAI Press, (2024)Secure Cooperative Systems with Jamming and Unreliable Backhaul over Nakagami-m Fading Channels., , , , and . INISCOM, volume 257 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 253-263. Springer, (2018)Dynamic analysis of Scissor Lift mechanism through bond graph modeling., , , and . AIM, page 1393-1399. IEEE, (2014)How Does Information Processing Efficiency Relate to Investment Efficiency? Evidence from XBRL Adoption., , , and . J. Inf. Syst., 35 (1): 1-25 (2021)A Method to Improve the Performance of Reinforcement Learning Based on the Y Operator for a Class of Stochastic Differential Equation-Based Child-Mother Systems., and . CoRR, (2023)Secrecy Performance of Small-Cell Networks over Nakagami-$m$ Fading in the Presence of Unreliable Backhaul and Imperfect CSI., , and . WiMob, page 257-261. IEEE, (2022)Separated Trust Regions Policy Optimization Method., , , , and . KDD, page 1471-1479. ACM, (2019)