Author of the publication

An Analysis of Two-User Uplink Asynchronous Non-orthogonal Multiple Access Systems.

, , and . IEEE Trans. Wireless Communications, 18 (2): 1404-1418 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of Two-User Uplink Asynchronous Non-orthogonal Multiple Access Systems., , and . IEEE Trans. Wireless Communications, 18 (2): 1404-1418 (2019)Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers., , , , and . IEEE Trans. Information Forensics and Security, 11 (2): 373-387 (2016)An Analysis of Uplink Asynchronous Non-Orthogonal Multiple Access Systems., , and . CoRR, (2018)Interference Alignment with Power Splitting Relays in Multi-User Multi-Relay Networks., , , , and . CoRR, (2017)On Secrecy Metrics for Physical Layer Security over Quasi-Static Fading Channels., , and . CoRR, (2016)An improved codebook model for detecting moving object under complex dynamic background., , , , , and . ICDIP, volume 8009 of SPIE Proceedings, page 80091M. SPIE, (2011)On Secure Transmission Design: An Information Leakage Perspective., , , , and . GLOBECOM, page 1-6. IEEE, (2018)Research on Unified interface of Heterogeneous database., and . ICEE, page 4513-4517. IEEE, (2010)Similarity Michaelis-Menten law pre-processing descriptor for face recognition., , , , and . IJCNN, page 1272-1277. IEEE, (2014)Rate Control Algorithm Considering Mobility in Mobile Ad Hoc Networks., , , , and . IJWIN, 17 (1-2): 26-33 (2010)