Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Jamming Mitigation via Aerial Reconfigurable Intelligent Surface: Passive Beamforming and Deployment Optimization., , , , and . IEEE Trans. Veh. Technol., 70 (6): 6232-6237 (2021)Deep Learning-Assisted Secure UAV-Relaying Networks With Channel Uncertainties., , , and . IEEE Trans. Veh. Technol., 71 (5): 5048-5059 (2022)Achieving Positive Secrecy Rate in Wireless Multiple Access Wiretap Channels., , and . IEEE Trans. Veh. Technol., 69 (8): 9121-9125 (2020)Joint Task Offloading, Resource Allocation, and Security Assurance for Mobile Edge Computing-Enabled UAV-Assisted VANETs., , , , , and . Remote. Sens., 13 (8): 1547 (2021)Robust Secrecy via Aerial Reflection and Jamming: Joint Optimization of Deployment and Transmission., , , , , and . CoRR, (2023)GrabAR: Occlusion-aware Grabbing Virtual Objects in AR., , , and . CoRR, (2019)Collaborative Intelligent Confident Information Coverage Node Sleep Scheduling for 6G-Empowered Green IoT., , , , , and . IEEE Trans. Green Commun. Netw., 7 (2): 1066-1077 (June 2023)Considering Monopoly Maintenance Cost for an Automobile Purchase in China: A DEA-Based Approach., , , , and . J. Systems Science & Complexity, 32 (4): 1167-1179 (2019)Document Reverse Engineering: From Paper to XML., , , , and . Document Analysis Systems, volume 2423 of Lecture Notes in Computer Science, page 503-506. Springer, (2002)A rotation and scale invariance face Recognition Method Based on Complex Network and Image Contour., , and . ICARCV, page 371-376. IEEE, (2012)