Author of the publication

Semantic Communication-Based Dynamic Resource Allocation in D2D Vehicular Networks.

, , , , , , and . IEEE Trans. Veh. Technol., 72 (8): 10784-10796 (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One pixel attack for fooling deep neural networks., , and . CoRR, (2017)Attacking convolutional neural network using differential evolution., , and . IPSJ Trans. Comput. Vis. Appl., (2019)Distributed robust power control in two-tier vehicle networks under uncertain channel environments., , , , , and . Digit. Commun. Networks, 9 (3): 734-742 (June 2023)Attacking Convolutional Neural Network using Differential Evolution., , and . CoRR, (2018)One pixel attack for fooling deep neural networks, , and . (2017)cite arxiv:1710.08864.Text-based Person Search via Virtual Attribute Learning., , , , , and . Int. J. Softw. Informatics, 13 (2): 157-176 (2023)Lightweight Classification of IoT Malware Based on Image Recognition., , , , , and . COMPSAC (2), page 664-669. IEEE Computer Society, (2018)978-1-5386-2667-2.Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation., , and . CANDAR Workshops, page 223-227. IEEE Computer Society, (2018)Evasion Attacks Against Statistical Code Obfuscation Detectors., , and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 121-137. Springer, (2017)Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection., , , and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 278-293. Springer, (2015)