Author of the publication

Hierarchical multi-beam training with the presence of the sub-connected hybrid beamforming architecture.

, , , , and . Trans. Emerg. Telecommun. Technol., (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power allocation based on fast Water-Filling for energy efficient OFDM and MIMO transmissions., , , , and . GLOBECOM, page 4758-4763. IEEE, (2012)Joint bit and power loading with user and stream selection in OSDM MU-MIMO broadcast channels., , , and . ICC, page 3862-3866. IEEE, (2012)A dynamic and low latency wireless NoC architecture., , and . ASICON, page 1-3. IEEE, (2015)DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model., , , , , , and . IEEE Symposium on Security and Privacy, page 673-690. IEEE, (2019)Low Delay LEO Satellite Relay Communication with Best Relay Selection., and . ICSCC, page 30-34. ACM, (2023)Compressive Sensing-Based Channel Estimation for FBMC-OQAM System Under Doubly Selective Channels., , , , , and . IEEE Access, (2019)Hierarchical multi-beam training with the presence of the sub-connected hybrid beamforming architecture., , , , and . Trans. Emerg. Telecommun. Technol., (March 2023)Vibration Signal Analysis Based on Hilbert-Huang Transform., , and . ICNC (5), page 646-650. IEEE Computer Society, (2008)Cross Platform API Mappings based on API Documentation Graphs., , , , and . QRS, page 926-935. IEEE, (2022)A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering., , , , and . ASE, page 307-318. IEEE, (2023)