Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk analysis and countermeasure for bit-flipping attack in LoRaWAN., , , and . ICOIN, page 549-551. IEEE, (2017)Stochastic Geometric Coverage Analysis in mmWave Cellular Networks with Realistic Channel and Antenna Radiation Models., , , , and . CoRR, (2018)On the Asymptotic Behavior of Ultra-Densification under a Bounded Dual-Slope Path Loss Model., , and . CoRR, (2017)Q-GADMM: Quantized Group ADMM for Communication Efficient Decentralized Machine Learning., , , , and . CoRR, (2019)An efficient generation mechanism of HMI information for heterogeneous PLCs., , , , and . ICUFN, page 46-48. IEEE, (2015)An ECDH-based light-weight mutual authentication scheme on local SIP., , , , , , and . ICUFN, page 871-873. IEEE, (2015)Minimizing Latency to Support VR Social Interactions Over Wireless Cellular Systems via Bandwidth Allocation., , and . IEEE Wirel. Commun. Lett., 7 (5): 776-779 (2018)Integrating LEO Satellites and Multi-UAV Reinforcement Learning for Hybrid FSO/RF Non-Terrestrial Networks., , , and . CoRR, (2020)A Subspace Projection Approach to Autoencoder-based Anomaly Detection., , , and . CoRR, (2023)Federated Knowledge Distillation., , , , and . CoRR, (2020)