Author of the publication

Achieving Secrecy of MISO Fading Wiretap Channels via Jamming and Precoding With Imperfect Channel State Information.

, , , and . IEEE Wireless Commun. Letters, 3 (4): 357-360 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Transmission with Hybrid Relay Scheme: Relaying and Jamming., , , and . EMS, page 220-224. IEEE, (2013)Similar vulnerability query based on text mining., , , , , , , and . ISCIT, page 339-342. IEEE, (2011)Electromagnetic Force Distribution and Deformation Homogeneity of Electromagnetic Tube Expansion With a New Concave Coil Structure., , , , , , , , and . IEEE Access, (2019)KADetector: Automatic Identification of Key Actors in Online Hack Forums Based on Structured Heterogeneous Information Network., , , , , , and . ICBK, page 154-161. IEEE Computer Society, (2018)ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network., , , , , , , and . ACSAC, page 542-552. ACM, (2018)αCyber: Enhancing Robustness of Android Malware Detection System against Adversarial Attacks on Heterogeneous Graph based Model., , , , , , , , and . CIKM, page 609-618. ACM, (2019)An Evolved Non-Orthogonal Multiple Access for User Multiplexing with Small-Data Transmission., , , and . VTC-Fall, page 1-5. IEEE, (2019)Nonorthogonal Interleave-Grid Multiple Access Scheme for Industrial Internet of Things in 5G Network., , , , , , and . IEEE Trans. Ind. Informatics, 14 (12): 5436-5446 (2018)A Searchable Knowledge Map Based on Ontology., , , and . SKG, page 457-460. IEEE Computer Society, (2008)A two-way training method for defending against pilot spoofing attack in MISO systems., , , and . ICC, page 1880-1885. IEEE, (2015)