Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers., , , , and . IEEE Trans. Information Forensics and Security, 11 (2): 373-387 (2016)An Analysis of Two-User Uplink Asynchronous Non-orthogonal Multiple Access Systems., , and . IEEE Trans. Wireless Communications, 18 (2): 1404-1418 (2019)An Analysis of Uplink Asynchronous Non-Orthogonal Multiple Access Systems., , and . CoRR, (2018)Interference Alignment with Power Splitting Relays in Multi-User Multi-Relay Networks., , , , and . CoRR, (2017)On Secrecy Metrics for Physical Layer Security over Quasi-Static Fading Channels., , and . CoRR, (2016)An improved codebook model for detecting moving object under complex dynamic background., , , , , and . ICDIP, volume 8009 of SPIE Proceedings, page 80091M. SPIE, (2011)On Secure Transmission Design: An Information Leakage Perspective., , , , and . GLOBECOM, page 1-6. IEEE, (2018)Spatio-Temporal Pattern of the Urban System Network in the Huaihe River Basin Based on Entropy Theory., , , , , , and . Entropy, 21 (1): 20 (2019)On the Design of Secure Non-Orthogonal Multiple Access Systems., , , and . IEEE Journal on Selected Areas in Communications, 35 (10): 2196-2206 (2017)Regularized Channel Inversion for Simultaneous Confidential Broadcasting and Power Transfer: A Large System Analysis., , , and . J. Sel. Topics Signal Processing, 10 (8): 1404-1416 (2016)