Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-Layer Attack and Defense in Cognitive Radio Networks., , , and . GLOBECOM, page 1-6. IEEE, (2010)LEAF + AIO: Edge-Assisted Energy-Aware Object Detection for Mobile Augmented Reality., , , and . IEEE Trans. Mob. Comput., 22 (10): 5933-5948 (October 2023)Eliminating NB-IoT Interference to LTE System: A Sparse Machine Learning-Based Approach., , , and . IEEE Internet Things J., 6 (4): 6919-6932 (2019)A Flow Graph-Based Scalable Critical Branch Identification Approach for AC State Estimation Under Load Redistribution Attacks., , , , , and . IEEE Trans. Ind. Informatics, 20 (3): 4079-4091 (March 2024)Digital Twin for Federated Analytics Using a Bayesian Approach., , , and . IEEE Internet Things J., 8 (22): 16301-16312 (2021)A Contract-Theory-Based Incentive Mechanism for UAV-Enabled VR-Based Services in 5G and Beyond., , , , , and . IEEE Internet Things J., 10 (18): 16465-16479 (September 2023)Intercommunity Detection Scheme for Social Internet of Things: Compressive Sensing Over Graphs Approach., , , , , , and . IEEE Internet Things J., 5 (6): 4550-4557 (2018)Edge-Assisted Democratized Learning Toward Federated Analytics., , , , , , and . IEEE Internet Things J., 9 (1): 572-588 (2022)Resource Allocation for MC MISO-NOMA SWIPT-Enabled HetNets With Non-Linear Energy Harvesting., , and . IEEE Access, (2020)Modelling Cyber Attacks on Electricity Market Using Mathematical Programming With Equilibrium Constraints., , , and . IEEE Access, (2019)