Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Service Distribution in WSN Service System Subject to Data Security Constraints., , , and . Sensors, 14 (8): 14180-14209 (2014)Artificial Interference Aided Physical Layer Security in Cache-Enabled Heterogeneous Networks., , , , and . SPAWC, page 1-5. IEEE, (2018)Research on link blocks recognition of web pages., , , , and . IJHPCN, 13 (3): 331-339 (2019)The Study on the Penalty Function of the Insurance Company When the Stock Price Follows Exponential Lévy Process., , and . SCSS (2), page 187-190. Springer, (2008)Ruin probabilities and optimal investment when the stock price follows an exponential Lévy process., , and . Applied Mathematics and Computation, (2015)Novel Polarization-Reconfigurable Converter Based on Multilayer Frequency-Selective Surfaces., , , , , and . Proceedings of the IEEE, 103 (7): 1057-1070 (2015)Internet of Things: Hotspot-based Discovery Service Architecture with Security Mechanism., , , , , and . I. J. Network Security, 17 (2): 208-216 (2015)The Research of Intelligent Storage System Based on UHF RFID., , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 655-661. Springer, (2013)Design of a Rail-to-Rail Constant-gm CMOS Operational Amplifier., , , and . CSIE (6), page 198-201. IEEE Computer Society, (2009)Parallel Media Processors for the Billion-Transistor Era., , and . ICPP, page 354-362. IEEE Computer Society, (1999)