Author of the publication

Joint correlation exploitation and network coding in two-way relaying systems.

, , , and . Comput. Syst. Sci. Eng., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A forensic analysis solution of the email network based on email contents., , and . FSKD, page 1613-1619. IEEE, (2015)A new method of applying the ETC technology to the underground parking lot in the supermarket., and . IJRIS, 8 (1/2): 52-58 (2016)Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network., , , and . Secur. Commun. Networks, 8 (10): 1865-1877 (2015)How Can We Understand the Past from Now On? Three-Dimensional Modelling and Landscape Reconstruction of the Shuanghuaishu Site in the Central Plains of China., , , , , , , and . Remote. Sens., 14 (5): 1233 (2022)A novel particle swarm optimizer with multi-stage transformation and genetic operation for VLSI routing., , , , and . CoRR, (2018)A forensics tool of Foxmail client., and . ICSAI, page 400-405. IEEE, (2014)A coevolutionary multi-objective PSO algorithm for VLSI floorplanning., , , and . ICNC, page 718-722. IEEE, (2012)A Survey of Swarm Intelligence Techniques in VLSI Routing Problems., , , , and . IEEE Access, (2020)Real web community based automatic image annotation., , and . Comput. Electr. Eng., 39 (3): 945-956 (2013)DPSO-based Rectilinear Steiner Minimal Tree construction considering bend reduction., , , and . ICNC, page 1161-1165. IEEE, (2011)