Author of the publication

A wireless secret key generation method based on Chinese remainder theorem in FDD systems.

, , , , and . SCIENCE CHINA Information Sciences, 55 (7): 1605-1616 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low complexity transmit antenna selection for spatial multiplexing systems., , and . Digital Signal Processing, 21 (2): 307-319 (2011)A simple energy efficient transceiver for IEEE 802.15.4., , , , and . ISCAS, page 597-600. IEEE, (2010)Secure Wireless Transmission Based on Precoding-Aided Spatial Modulation., , , and . GLOBECOM, page 1-6. IEEE, (2015)A closed-form robust chinese remainder theorem and its performance analysis., and . IEEE Trans. Signal Processing, 58 (11): 5655-5666 (2010)A Distributed File System with Variable Sized Objects for Enhanced Random Writes., , , and . Comput. J., 59 (10): 1536-1550 (2016)Two-dimensional direction finding for wideband signals using simplified array configuration., , and . ISCAS (3), page 78-81. IEEE, (1999)Bridge Rule Based D3 L Reasoning., , , , , and . SKG, page 178-181. IEEE Computer Society, (2013)Chat More: Deepening and Widening the Chatting Topic via A Deep Model., , , , and . SIGIR, page 255-264. ACM, (2018)An Intelligent System for Personalized Conference Event Recommendation and Scheduling., , , and . ECAI, volume 285 of Frontiers in Artificial Intelligence and Applications, page 1797-1802. IOS Press, (2016)Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks., , , and . ICME, page 1417-1420. IEEE Computer Society, (2006)