Author of the publication

Robust AN-aided Secure Beamforming for Full-Duplex Relay System with Multiple Eavesdroppers.

, , , , and . TrustCom, page 317-322. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Priority Refinement for Dependent Tasks in Large Embedded Real-Time Software., , , , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 365-374. IEEE Computer Society, (2005)The state of the art of risk assessment and management for information systems., , , , , and . IAS, page 66-71. IEEE, (2013)Eliminating small stopping sets in irregular low-density parity-check codes., , , and . IEEE Communications Letters, 13 (6): 435-437 (2009)A Framework for Crowd-Based Causal Analysis of Open Data., , and . SMC, page 2188-2193. IEEE, (2018)Metaphors Embedded in Chinese Characters Bridge Dissimilar Concepts., , and . CogSci, cognitivesciencesociety.org, (2021)Affinity and foreign users' perception about Chinese mobile apps: An integrated view of affective contagion and value-based perspectives., , and . Electron. Commer. Res. Appl., (2022)A Novel Illumination Normalization Method for Face Recognition., , , and . IWBRS, volume 3781 of Lecture Notes in Computer Science, page 23-30. Springer, (2005)Resource Allocation and Design of Variable Length Per-Tone Equalizers in MIMO-OFDM Systems., , , and . VTC Fall, page 1-6. IEEE, (2010)Portal-based Knowledge Environment for Collaborative Science., , , , , , , , , and 3 other author(s). Concurr. Comput. Pract. Exp., 19 (12): 1703-1716 (2007)Adaptive Ho-Kashyap rules for perceptron training., and . IEEE Trans. Neural Networks, 3 (1): 51-61 (1992)