From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reconfigurable Security: Edge Computing-based Framework for IoT., , , и . CoRR, (2017)Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction., , , , и . CoRR, (2017)Hybrid Full-/Half-Duplex System Analysis in Heterogeneous Wireless Networks., и . CoRR, (2014)Latency-Oriented Secure Wireless Federated Learning: A Channel-Sharing Approach With Artificial Jamming., , , , и . IEEE Internet Things J., 10 (11): 9675-9689 (июня 2023)Network Coded Constrained Application Protocol With Improved Energy Efficiency for IIoT Networks., , , , , и . IEEE Internet Things J., 10 (12): 10893-10906 (июня 2023)Resource-Optimized Recursive Access Class Barring for Bursty Traffic in Cellular IoT Networks., , , и . IEEE Internet Things J., 8 (14): 11640-11654 (2021)MOSAIC: Multiobjective Optimization Strategy for AI-Aided Internet of Things Communications., , и . IEEE Internet Things J., 9 (17): 15657-15673 (2022)Reputation-Based Federated Learning for Secure Wireless Networks., , , , , и . IEEE Internet Things J., 9 (2): 1212-1226 (2022)Computation Offloading for Mobile Edge Computing Enabled Vehicular Networks., , , , и . IEEE Access, (2019)Applicable and Partial Learning of Graph Topology Without Sparsity Priors., , , и . IEEE Trans. Netw. Sci. Eng., 10 (1): 360-371 (2023)