Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted., , , and . VTC Fall, page 1-5. IEEE, (2016)A proactive defense mechanism for mobile communication user data., , , and . Sci. China Inf. Sci., 61 (10): 109303:1-109303:3 (2018)Link Prediction Based on Information Preference Connection for Directed Network., , , and . SmartIoT, page 183-189. IEEE, (2020)Analysis of Abnormal Events in IMS and Research on the Strategy of Detection., , and . CIS, page 712-716. IEEE Computer Society, (2011)Secrecy analysis in D2D-enabled cellular networks against spatially random eavesdroppers., , , , and . WPMC, page 262-267. IEEE, (2016)Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet., , , , , and . IET Commun., 13 (2): 144-152 (2019)Secrecy Outage and Diversity Analysis in D2D-Enabled Cellular Networks., , , and . VTC Spring, page 1-5. IEEE, (2017)A Study on Networking Scheme of Indoor Visible Light Communication Networks., , , , and . VTC Spring, page 1-5. IEEE, (2014)Research on SSTI attack defense technology based on instruction set randomization., , , , and . ICAIIS, page 287:1-287:5. ACM, (2021)A Transmission Scheme for Encrypted Speech over GSM Network., , , and . ISCSCT (2), page 805-808. IEEE Computer Society, (2008)