Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparative Research of Robustness for Image Watermarking., , and . CSSE (3), page 700-703. IEEE Computer Society, (2008)978-0-7695-3336-0.Automatic network protocol message format analysis., , and . Journal of Intelligent and Fuzzy Systems, 31 (4): 2271-2279 (2016)Learning Automata Representation of Network Protocol by Grammar Induction., and . WISM, volume 6318 of Lecture Notes in Computer Science, page 220-227. Springer, (2010)Automatic Network Protocol Automaton Extraction., , and . NSS, page 336-343. IEEE Computer Society, (2009)Multiple-User Cooperative Communications Based on Linear Network Coding., and . IEEE Trans. Communications, 58 (12): 3345-3351 (2010)Diversity-Multiplexing Tradeoff Analysis of Coded Multi-User Relay Networks., , and . IEEE Trans. Communications, 59 (7): 1995-2005 (2011)Optimal Decoding and Performance Analysis of a Noisy Channel Network with Network Coding., and . IEEE Trans. Communications, 57 (5): 1402-1412 (2009)Spectrum Sensing and Throughput Analysis for Cognitive Two-Way Relay Networks With Multiple Transmit Powers., , , and . IEEE Journal on Selected Areas in Communications, 34 (11): 3038-3047 (2016)A Commercial Video-Caching System for Small-Cell Cellular Networks Using Game Theory., , , , , and . IEEE Access, (2016)Flowing with the water: On optimal monitoring of water distribution networks by mobile sensors., , and . INFOCOM, page 1-9. IEEE, (2016)