Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An elastic resource allocation algorithm enabling wireless network virtualization., , , , and . Wireless Communications and Mobile Computing, 15 (2): 295-308 (2015)Joint user grouping and resource allocation for uplink virtual MIMO systems., , , , and . SCIENCE CHINA Information Sciences, 59 (2): 1-14 (2016)A novel complexity metric of FH/SS sequences using approximate entropy., , , and . WCNC, page 192-196. IEEE, (2009)Elevation domain channel measurement and modeling for FD-MIMO with different UE height., , , , and . WCNC, page 70-75. IEEE, (2015)A quantum secure direct communication protocol based on four-qubit cluster state., , , and . Security and Communication Networks, 8 (1): 36-42 (2015)DA-PMHT for Multistatic Passive Radar Multitarget Tracking in Dense Clutter Environment., , , and . IEEE Access, (2019)A Rotation-Based Quasi-Orthogonal Space-Time Block Coded OFDM System over Frequency-Selective Channels., , , and . CIT, page 485-489. IEEE Computer Society, (2005)Underwater Bearings-Only Multitarget Tracking Based on Modified PMHT in Dense-Cluttered Environment., , , and . IEEE Access, (2019)Nodes Density Adaptive Opportunistic Forwarding Protocol for Intermittently Connected Networks., , , and . IIKI, page 297-300. IEEE Computer Society, (2014)Privacy Information Security Classification and Comparison between the Westerner and Chinese., and . IIKI, page 13-18. IEEE Computer Society, (2015)