Author of the publication

Intelligent Task Offloading for 6G-Enabled Maritime IoT Based on Reinforcement Learning.

, , , and . SPAC, page 566-570. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of Dual-Rate Sampled Hammerstein Systems with a Piecewise-Linear Nonlinearity Using the Key Variable Separation Technique., , and . Algorithms, 8 (3): 366-379 (2015)Ultralow Loss Hollow-Core Conjoined-Tube Negative-Curvature Fiber for Data Transmission., , , , , , , , , and 1 other author(s). OFC, page 1-3. IEEE, (2019)Analysis and research on dynamic change in wetland resource based on 3S techniques - take Ye Yahu Wetland for example., , , , , and . IGARSS, page 3652-3655. IEEE, (2005)Style preserving Chinese character synthesis based on hierarchical representation of character., , , and . ICASSP, page 1097-1100. IEEE, (2008)Design and implementation of all IP architecture for beyond 3G system., , , and . PIMRC, page 667-671. IEEE, (2004)An improved algorithm based on fuzzy theory for 802.11 DCF., , and . FSKD, page 536-539. IEEE, (2012)Moderating Role of Online Self-Efficacy in Relation between Learning Strategy and Online Performance., , and . ICCE, volume 151 of Frontiers in Artificial Intelligence and Applications, page 517-520. IOS Press, (2006)Blind Fingerprinting, and . CoRR, (2008)informal publication.Destination-Aided Wireless Power Transfer in Energy-Limited Cognitive Relay Systems., , , and . IEEE Access, (2016)Steganalysis of block-structured stegotext., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 477-488. SPIE, (2004)