Author of the publication

Resource Allocation in Information-Centric Wireless Networking With D2D-Enabled MEC: A Deep Reinforcement Learning Approach.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy in the Internet of Things for Smart Healthcare., , , , and . IEEE Communications Magazine, 56 (4): 38-44 (2018)Social interaction increases capacity of wireless networks., , and . IWCMC, page 467-472. IEEE, (2013)Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities: Part 3., , , , , and . IEEE Communications Magazine, 56 (3): 126-127 (2018)An SNR-Assured Anti-Jamming Routing Protocol for Reliable Communication in Industrial Wireless Sensor Networks., , , and . IEEE Communications Magazine, 56 (2): 23-29 (2018)A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile Services., , , , , and . CoRR, (2018)Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs)., , , and . IEEE Access, (2019)LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT., , , , , and . CoRR, (2018)On Efficient Network Planning and Routing in Large-Scale MANETs., , , and . IEEE Trans. Vehicular Technology, 58 (7): 3796-3801 (2009)Failure Prediction Based on Multi-Scale Frequent Anomalous Behavior Identification in Support of Autonomic Networks., , , and . GLOBECOM, page 1-5. IEEE, (2010)AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application., , , , and . ICC, page 1-6. IEEE, (2017)