Author of the publication

Trajectory Design and Resource Allocation for Multi-UAV Communications Under Blockage-Aware Channel Model.

, , , , , and . IEEE Trans. Commun., 72 (4): 2324-2338 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack-proof collaborative spectrum sensing in cognitive radio networks., , , and . CISS, page 130-134. IEEE, (2009)CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing., , , and . GLOBECOM, page 1-6. IEEE, (2009)The Name-Passing Calculus., and . CoRR, (2015)A Generic Model for Analyzing Security Protocols., , , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 119-128. Springer, (2005)Coalitional Game Theory for Communication Networks: A Tutorial, , , , and . (2009)cite arxiv:0905.4057 Comment: IEEE Signal Processing Magazine, Special Issue on Game Theory, to appear, 2009. IEEE Signal Processing Magazine, Special Issue on Game Theory, to appear, 2009.Free Space Optical Integrated Sensing and Communication Based on LFM and CPM., , , and . IEEE Commun. Lett., 28 (1): 43-47 (January 2024)CCA-Net: A Lightweight Network Using Criss-Cross Attention for CSI Feedback., , , and . IEEE Commun. Lett., 27 (7): 1879-1883 (July 2023)AI-Assisted MAC for Reconfigurable Intelligent Surface-Aided Wireless Networks: Challenges and Opportunities., , , , , , , , and . CoRR, (2021)Resource Allocation for Device-to-Device Communications in Multi-Cell Multi-Band Heterogeneous Cellular Networks., , , , , and . CoRR, (2019)Incentivizing Proof-of-Stake Blockchain for Secured Data Collection in UAV-Assisted IoT: A Multi-Agent Reinforcement Learning Approach., , , , and . CoRR, (2022)