Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining., , , , and . Computer, 49 (2): 54-62 (2016)Secrecy Performance for Finite-Alphabet Inputs Over Fluctuating Two-Ray Channels in FDA Communications., , , , and . IEEE Wirel. Commun. Lett., 9 (10): 1638-1642 (2020)An Analytic Approach for Modeling Uplink Performance of Mega Constellations., , , and . IEEE Trans. Veh. Technol., 72 (2): 2258-2268 (February 2023)Satellite Multi-Beam Collaborative Scheduling in Satellite Aviation Communications., , , and . IEEE Trans. Wirel. Commun., 23 (3): 2097-2111 (March 2024)On the Ergodic Capacity of Reconfigurable Intelligent Surface (RIS)-Aided MIMO Channels., , , , and . CoRR, (2021)Guest Editorial: Introduction to the Special Section on Heterogeneous Communications Networks., , , and . IEEE Trans. Netw. Sci. Eng., 7 (4): 2361-2362 (2020)Load-Aware Distributed Resource Allocation for MF-TDMA Ad Hoc Networks: A Multi-Agent DRL Approach., , , , and . IEEE Trans. Netw. Sci. Eng., 9 (6): 4426-4443 (2022)Challenges and Solutions for the Satellite Tracking, Telemetry, and Command System., , , , , and . IEEE Wirel. Commun., 27 (6): 12-18 (2020)Dynamic Privacy Pricing: A Multi-Armed Bandit Approach With Time-Variant Rewards., , , , , and . IEEE Trans. Inf. Forensics Secur., 12 (2): 271-285 (2017)Information sharing in cooperative networks: A generic trustworthy issue., , , and . ICC, page 1-6. IEEE, (2016)