Author of the publication

Joint Security Service Assignment, Power Control and Multi-Step Computation Offloading in Ultra-Dense Multi-Task NOMA-Enabled Networks.

, , , , , and . IEEE Trans. Veh. Technol., 73 (7): 10211-10227 (July 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic and Interactive Retrieval of Chinese Calligraphic Character Images Based on Multiple Features., , , , , and . DASFAA (1), volume 6587 of Lecture Notes in Computer Science, page 300-310. Springer, (2011)Model-based RL in Contextual Decision Processes: PAC bounds and Exponential Improvements over Model-free Approaches, , , , and . (2018)cite arxiv:1811.08540Comment: COLT 2019.Hand segmentation for hand-object interaction from depth map., , , , , and . GlobalSIP, page 259-263. IEEE, (2017)Minimax Weight and Q-Function Learning for Off-Policy Evaluation, and . (2019)cite arxiv:1910.12809.Neural Network Architecture Optimization through Submodularity and Supermodularity, , , , and . (2016)Analysis of the repeatability of the pencil lead break artificial sound source, , , , , , , , and . 59th Annual British Conference on Non-Destructive Testing, (September 2020)Layer-wise learning based stochastic gradient descent method for the optimization of deep convolutional neural network., , , and . J. Intell. Fuzzy Syst., 37 (4): 5641-5654 (2019)Layered Space-time Architecture for LAS-MIMO CDMA System, , , and . page 2015-2024. (2005)Nova+: Generative Language Models for Binaries., , , , , and . CoRR, (2023)DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems., , , , , , and . IEEE Trans. Ind. Informatics, 18 (1): 345-355 (2022)