Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gravity waves observation of wind field in stratosphere based on a Rayleigh Doppler lidar, , , , , , , , and . Opt. Express, 24 (6): A581--A591 (March 2016)DRL based low carbon economic dispatch by considering power transmission safety limitations in internet of energy., , , , , , and . Internet Things, (December 2023)Determining image base of firmware for ARM devices by matching literal pools., , , , and . Digit. Investig., (2016)A dataset for learning stylistic and cultural correlations between music and videos., , , , , and . Cogn. Comput. Syst., 4 (2): 177-187 (2022)UAV Trajectory Planning With Interference Awareness in UAV-Enabled Time-Constrained Data Collection Systems., and . IEEE Trans. Veh. Technol., 73 (2): 2799-2815 (2024)Performance Modeling and Analysis of the LAA Category-4 LBT Procedure., , , and . IEEE Trans. Veh. Technol., 68 (10): 10045-10055 (2019)Modeling and Analysis of the Downlink Local Delay in MEC-Based VANETs., and . IEEE Trans. Veh. Technol., 69 (6): 6619-6630 (2020)UAV Trajectory Optimization for Time-Constrained Data Collection in UAV-Enabled Environmental Monitoring Systems., and . IEEE Internet Things J., 9 (23): 24300-24314 (2022)Performance Modeling of an NR-U and WiFi Coexistence System Using the NR-U Category-4 LBT Procedure and 802.11e EDCA Mechanism in the Presence of Hidden Nodes., , , and . IEEE Internet Things J., 10 (18): 16658-16674 (September 2023)A multitarget backdooring attack on deep neural networks with random location trigger., , , , , , , and . Int. J. Intell. Syst., 37 (3): 2567-2583 (2022)