Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preface., and . J. Comput. Sci. Technol., 23 (2): 165 (2008)Symbol Timing Estimation with Multi-h CPM Signals., , and . JNW, 9 (4): 921-926 (2014)How to Select Optimal Gateway in Multi-Domain Wireless Networks: Alternative Solutions without Learning., and . IEEE Trans. Wireless Communications, 12 (11): 5620-5630 (2013)Privacy-Preserving Data Aggregation in Mobile Phone Sensing., , and . IEEE Trans. Information Forensics and Security, 11 (5): 980-992 (2016)Wormhole Attack Detection Algorithms in Wireless Network Coding Systems., , and . IEEE Trans. Mob. Comput., 14 (3): 660-674 (2015)Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks., , and . GLOBECOM, page 453-457. IEEE, (2007)TagSmart: analysis and visualization for yeast mutant fitness data measured by tag microarrays., , , , , and . BMC Bioinformatics, (2007)Approximate Capacities of Two-Dimensional Codes by Spatial Mixing., , and . CoRR, (2014)Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt., , , , and . IEEE Access, (2018)A multimodal investigation of in vivo muscle behavior: System design and data analysis., , , , , , and . ISCAS, page 2053-2056. IEEE, (2014)