Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security-aware routing for artificial-noise-aided multi-hop secondary communications., , , and . WCNC, page 1-6. IEEE, (2018)ICA-based channel estimation and identification against pilot spoofing attack for OFDM systems., , , , and . WCNC, page 1-6. IEEE, (2018)Full-Duplex or Half-Duplex? Hybrid Relay Selection for Physical Layer Secrecy., , , and . VTC Spring, page 1-5. IEEE, (2016)Self-Interference Assisted Cooperative Jamming for Secure Communications., and . VTC Fall, page 1-5. IEEE, (2023)Global-Selector: A New Benchmark Dataset and Model Architecture for Multi-turn Response Selection., , , , and . CoRR, (2021)Classifier selection and clustering with fuzzy assignment in ensemble model for credit scoring., , and . Neurocomputing, (2018)A novel hybrid ensemble model based on tree-based method and deep learning method for default prediction., and . Expert Syst. Appl., (2021)A Benchmark for Understanding Dialogue Safety in Mental Health Support., , , , , and . NLPCC (2), volume 14303 of Lecture Notes in Computer Science, page 1-13. Springer, (2023)Hard-Boundary Attention Network for Nuclei Instance Segmentation., , , , and . MMAsia, page 22:1-22:7. ACM, (2021)BCData: A Large-Scale Dataset and Benchmark for Cell Detection and Counting., , , , , , , , , and 2 other author(s). MICCAI (5), volume 12265 of Lecture Notes in Computer Science, page 289-298. Springer, (2020)