Author of the publication

Robust Channel Estimation for RIS-Aided Millimeter-Wave System With RIS Blockage.

, , , and . IEEE Trans. Veh. Technol., 71 (5): 5621-5626 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborative 'many to many' DDoS detection in cloud., , and . IJAHUC, 23 (3/4): 192-202 (2016)NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification., , , , , , , and . RAID, page 309-321. USENIX Association, (2019)Key-Policy Weighted Attribute based Encryption for fine-grained access control., , , , and . ICC Workshops, page 694-699. IEEE, (2014)CDRep: Automatic Repair of Cryptographic Misuses in Android Applications., , , and . AsiaCCS, page 711-722. ACM, (2016)Active Semi-supervised Approach for Checking App Behavior against Its Description., , , , and . COMPSAC, page 179-184. IEEE Computer Society, (2015)VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples., , , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 229-246. Springer, (2017)An empirical study of SMS one-time password authentication in Android apps., , , , , , , , , and . ACSAC, page 339-354. ACM, (2019)Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing., , , , , and . CoRR, (2019)Adaptable key-policy attribute-based encryption with time interval., , , and . Soft Comput., 21 (20): 6191-6200 (2017)Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption., , , and . IEEE Trans. Information Forensics and Security, 10 (7): 1384-1393 (2015)