Author of the publication

A Stochastic Linear Programming Method for the Reliable Oil Products Supply Chain System With Hub Disruption.

, , , , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure End-to-End Cloud Computing Solution for Emergency Management with UAVs., , , , , and . GLOBECOM, page 1-7. IEEE, (2018)Crop Water Stress Index as a Proxy of Phenotyping Maize Performance under Combined Water and Salt Stress., , , , , and . Remote. Sens., 13 (22): 4710 (2021)Game Theory of Data-selling Ransomware., and . J. Cyber Secur. Mobil., 10 (1): 65-96 (2021)Review on intelligent pipeline technologies: A life cycle perspective., , , , , , , and . Comput. Chem. Eng., (July 2023)AdaSem: Adaptive Goal-Oriented Semantic Communications for End-to-End Camera Relocalization., and . CoRR, (2024)Connections Between Spectral Properties of Asymptotic Mappings and Solutions to Wireless Network Problems., , and . IEEE Trans. Signal Process., 67 (10): 2747-2760 (2019)As with Wine, Life Gets Better with Age. Redefining Mobile User Interface (UI) Components in the Age-Friendly Design Transformation., , , , , , , , , and 9 other author(s). HCI (12), volume 14022 of Lecture Notes in Computer Science, page 161-171. Springer, (2023)A Game-theoretic analysis on the economic viability of mobile content pre-staging., , and . Wirel. Networks, 26 (1): 667-683 (2020)Preventive portfolio against data-selling ransomware - A game theory of encryption and deception., and . Comput. Secur., (2022)Real-Time Camera Localization with Deep Learning and Sensor Fusion., and . ICC, page 1-7. IEEE, (2021)