Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Transmission Optimization of Full-Duplex Energy Harvesting Enabled Hybrid Relaying., , , and . GLOBECOM, page 1-7. IEEE, (2016)iCacheOS: In-RAN Caches Orchestration Strategy through Content Joint Wireless and Backhaul Routing in Small-Cell Networks., , and . GLOBECOM, page 1-7. IEEE, (2015)High-resolution cell breathing for improving energy efficiency of Ultra-Dense HetNets., , , and . WCNC, page 1458-1463. IEEE, (2015)HHF: Hashing-Guided Hinge Function for Deep Hashing Retrieval., , , , , , and . IEEE Trans. Multim., (2023)Deep Reinforcement Learning: Framework, Applications, and Embedded Implementations., , , , and . CoRR, (2017)Dynamic converter reconfiguration for near-threshold non-volatile processors using in-door energy harvesting., , , , and . ICCD, page 289-295. IEEE Computer Society, (2016)Luminescent solar concentrator-based photovoltaic reconfiguration for hybrid and plug-in electric vehicles., , , , , and . ICCD, page 281-288. IEEE Computer Society, (2016)New Passive and Active Attacks on Deep Neural Networks in Medical Applications., , , , , , , and . ICCAD, page 39:1-39:9. IEEE, (2020)PickerOptimizer: A Deep Learning-Based Particle Optimizer for Cryo-Electron Microscopy Particle-Picking Algorithms., , , , and . ISBRA, volume 13064 of Lecture Notes in Computer Science, page 549-560. Springer, (2021)Satellite Telemetry Data Anomaly Detection using Multiple Factors and Co-Attention based LSTM., , , and . WCNC, page 1-6. IEEE, (2023)