From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Belief surveillance with Twitter., , , и . WebSci, стр. 43-46. ACM, (2012)Time Reversal SWIPT Networks with an Active Eavesdropper: SER-Energy Region Analysis., , , , и . VTC Fall, стр. 1-5. IEEE, (2016)Generalized Code Index Modulation Technique for High-Data-Rate Communication Systems., , и . IEEE Trans. Veh. Technol., 65 (9): 7000-7009 (2016)An Experimental Study of External Memory Algorithms for Connected Components., , , , , и . SEA, том 190 из LIPIcs, стр. 23:1-23:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Spam detection in online classified advertisements., , , , и . WebQuality@WWW, стр. 35-41. ACM, (2011)Physical Layer Security in Cognitive Radio Networks for IoT Using UAV With Reconfigurable Intelligent Surfaces., , , , , и . JCSSE, стр. 1-5. IEEE, (2021)Engineering Uniform Sampling of Graphs with a Prescribed Power-law Degree Sequence., , , , и . ALENEX, стр. 27-40. SIAM, (2022)Generalized Technique for Radiation Pattern Modeling of Multibeam Conformal Patch Array Antennas., , , и . RWS, стр. 8-10. IEEE, (2021)Secrecy Outage Probability and Fairness of Packet Transmission Time in a NOMA System., , , , , и . IEEE Access, (2020)Impact of secondary user communication on security communication of primary user., , и . Secur. Commun. Networks, 8 (18): 4177-4190 (2015)