Author of the publication

Reference-shifted DCSK modulation scheme for secure communication.

, , , and . ICNC, page 1073-1076. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Susceptible-Infected Model of Malware Propagation in the Internet., , , and . ICYCS, page 2771-2775. IEEE Computer Society, (2008)Two-Layer Carrier Index Modulation Scheme Based on Differential Chaos Shift Keying., , , and . IEEE Access, (2018)Active fault-tolerant control approach design for rigid spacecraft with multiple actuator faults., , , , and . J. Systems & Control Engineering, (2018)Reliability Analysis of Large-Scale Adaptive Weighted Networks., , , , , , and . IEEE Trans. Information Forensics and Security, (2020)Bas-relief Generation from Point Clouds Based on Normal Space Compression with Real-time Adjustment on CPU., , , , , , and . CoRR, (2019)Cooperative FPT-based spectrum sensing algorithm with decision fusion., , , , and . WCSP, page 1-5. IEEE, (2014)Modeling and Experiment of Three-cavity Soft Manipulator., , , and . CCIS, page 1018-1022. IEEE, (2018)Asymptotic Solutions and Circuit Implementations of a Rayleigh Oscillator Including Cubic Fractional Damping Terms., , and . CSSP, 35 (6): 2041-2053 (2016)Robust spectrum sensing algorithm based on free probability theory., , , and . Wireless Communications and Mobile Computing, 16 (13): 1668-1679 (2016)Improving Both Quantity and Quality: Incentive Mechanism for Social Mobile Crowdsensing Architecture., , , , and . IEEE Access, (2018)