Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Operation of Secure Cyber-Physical Systems., and . IEEE Embed. Syst. Lett., 7 (1): 3-6 (2015)Resource Allocation for Decode-and-Forward Relaying Assisted Multi-cell Orthogonal Frequency Division Multiplexing Systems with Frequency Planning., and . Wirel. Pers. Commun., 79 (1): 789-810 (2014)Throughput Analysis and Optimization Based on Mobility Analysis and Markov Process for Heterogeneous Wireless Networks., and . Wirel. Pers. Commun., 77 (2): 1091-1116 (2014)Performance Analysis of an Improved Common Radio Resource Management Algorithm Based on Load Balance and Service Characteristics., , and . Wirel. Pers. Commun., 71 (1): 317-338 (2013)Brain Functional Connectivity under Teleoperation Latency: a fNIRS Study., , , , and . CoRR, (2023)Semi-supervised Semantics-guided Adversarial Training for Trajectory Prediction., , , , and . CoRR, (2022)Rectified Pessimistic-Optimistic Learning for Stochastic Continuum-armed Bandit with Constraints., , and . CoRR, (2022)Non-Transferable Learning: A New Approach for Model Verification and Authorization., , , , and . CoRR, (2021)State-wise Safe Reinforcement Learning With Pixel Observations., , , , , and . CoRR, (2023)ReachNN: Reachability Analysis of Neural-Network Controlled Systems., , , , and . CoRR, (2019)