Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probability Fusion Decision Framework of Multiple Deep Neural Networks for Fine-Grained Visual Classification., , , , , and . IEEE Access, (2019)Gain Without Pain: Accurate WiFi-based Localization using Fingerprint Spatial Gradient., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (2): 29:1-29:19 (2017)An efficient strongly secure authenticated key exchange protocol without random oracles.. Secur. Commun. Networks, 8 (8): 1461-1473 (2015)Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation., , , and . Secur. Commun. Networks, 8 (18): 3356-3371 (2015)A new efficient signcryption scheme in the standard model.. Secur. Commun. Networks, 8 (5): 778-789 (2015)Power Allocation Study for Non-Orthogonal Multiple Access Networks With Multicast-Unicast Transmission., , , , and . IEEE Trans. Wirel. Commun., 17 (6): 3588-3599 (2018)A General Power Allocation Scheme to Guarantee Quality of Service in Downlink and Uplink NOMA Systems., , , and . IEEE Trans. Wirel. Commun., 15 (11): 7244-7257 (2016)Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks., , , , , , , , and . CoRR, (2023)Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference., , , , , , , and . CoRR, (2021)Chordal and factor-width decompositions for scalable semidefinite and polynomial optimization., , and . CoRR, (2021)