Author of the publication

Confidential Cooperative Communication with the Trust Degree of Jammer.

, , , and . Entropy, 21 (6): 595 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Viscous flow and colloid transport near air-water interface in a microchannel., , , , , and . Computers & Mathematics with Applications, 59 (7): 2290-2304 (2010)Soft Metric Assisted Mobility Robustness Optimization in LTE Networks., and . ISWCS, page 1-5. IEEE, (2012)A Simulation Study of LTE Intra-Frequency Handover Performance., , and . VTC Fall, page 1-5. IEEE, (2010)Blind Interference Neutralization in 3-Cell Interference Channel with Shared Relay., , and . VTC Spring, page 1-5. IEEE, (2014)A More Accurate Outage Analysis for ZF-Based MIMO AF Two-Way Relaying by Order Statistics., , and . VTC Spring, page 1-5. IEEE, (2014)Lock-free dynamic hash tables with open addressing., , and . Distributed Computing, 18 (1): 21-42 (2005)Joint relay transmit-receive antenna selection and opportunistic source selection strategy for full-duplex relaying., , , and . ICT, page 37-41. IEEE, (2014)Maximizing Data Credibility Under Budget Constraint for Participatory Sensing., , , , , and . HPCC/CSS/ICESS, page 134-139. IEEE, (2015)Blind Synchronization and Demodulation for Noncoherent Ultra-Wideband System with Robustness against ISI and IFI., , and . ICC, page 1-5. IEEE, (2010)Individual tooth segmentation from CT images using level set method with shape and intensity prior., and . Pattern Recognition, 43 (7): 2406-2417 (2010)