Author of the publication

Performance Analysis for mm-Wave ISAC Systems with Mutual Benefit.

, , , , and . GLOBECOM, page 5438-5443. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Over-the-Air Antenna Array Calibration for mmWave Hybrid Beamforming Systems Based on Monte Carlo Markov Chain Method., , , and . IEEE Trans. Veh. Technol., 72 (5): 6068-6079 (May 2023)A child caring robot for the dangerous behavior detection based on the object recognition and human action recognition., , , , and . ROBIO, page 1921-1926. IEEE, (2018)Multi-index hashing with repeat-bits in hamming space., , and . FSKD, page 1307-1313. IEEE, (2015)Evolution and Driving Forces of the Landscape Change Pattern of Non-Construction Land in Downtown Chengdu., , , , and . Geoinformatics, page 1-8. IEEE, (2022)Covert and Reliable Short-Packet Communications against A Proactive Warder., , , , and . ICCC, page 1-6. IEEE, (2023)IRS-Aided Covert Communications Over Correlated Fading Channels: Analysis and Optimization., , , , and . IEEE Wirel. Commun. Lett., 12 (10): 1801-1805 (October 2023)Design and Analysis of Probabilistic Shaping for Polar Coded Communication Systems with Finite Blocklength., , , and . VTC Fall, page 1-6. IEEE, (2022)Covert Communication for Intelligent Reflecting Surface based Symbiotic Radio Systems., , , and . ICCC, page 1-6. IEEE, (2023)Efficient indexing of binary LSH for high dimensional nearest neighbor., , and . Neurocomputing, (2016)Malicious website detection under the exploratory attack., , and . ICMLC, page 565-570. IEEE, (2013)