Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks., , , and . GLOBECOM, page 3145-3150. IEEE, (2014)Secrecy wireless information and power transfer in fading wiretap channel., , and . ICC, page 5402-5407. IEEE, (2014)Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks., , , , , , , and . CoRR, (2017)Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming., , , , and . IEEE Trans. Industrial Informatics, 12 (5): 1714-1725 (2016)Secure resource allocation for OFDMA two-way relay networks., , , , , and . GLOBECOM, page 3649-3654. IEEE, (2012)Collaborative Computation Offloading in Wireless Powered Mobile-Edge Computing Systems., , , and . CoRR, (2019)Optimizing DF Cognitive Radio Networks With Full-Duplex-Enabled Energy Access Points., , , and . IEEE Trans. Wireless Communications, 16 (7): 4683-4697 (2017)Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks., , , and . IEEE Trans. Wireless Communications, 15 (12): 7971-7984 (2016)Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel., , and . IEEE Trans. Vehicular Technology, 65 (1): 180-190 (2016)Optimal Resource Allocation for Wireless Powered Mobile Edge Computing with Dynamic Task Arrivals., , and . ICC, page 1-7. IEEE, (2019)