Author of the publication

A Novel AI Security Application Function of 5G Core Network for V2X C-ITS Facilities Layer.

, , , and . ICC, page 6211-6217. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A multi-level approach to link state: ML-OLSR., and . MOBIWAC, page 87-96. ACM, (2012)Olsr Routing for Military Ad-Hoc Networks., , , , , , , , and . MWCN, World Scientific, (2003)A Survey on the Opportunities of Blockchain and UAVs in Agriculture., , , , , and . PEMWN, page 1-6. IEEE, (2022)Wireless Broadcast with Network Coding: Dynamic Rate Selection., and . Med-Hoc-Net, volume 265 of IFIP, page 191-202. Springer, (2008)Designing Medium Access Control Protocol Sequences Through Deep Reinforcement Learning., , , and . EuCNC/6G Summit, page 1-6. IEEE, (2023)Automated Header Compression in Constrained Networks., , , , , , , and . IEEE Commun. Stand. Mag., 8 (3): 4-9 (September 2024)NetDiff: Deep Graph Denoising Diffusion for Ad Hoc Network Topology Generation., , and . CoRR, (2024)5G V2X Misbehavior Detection as Edge Core Network Function Based on AI/ML., , , and . GLOBECOM, page 2870-2875. IEEE, (2023)Deep Reinforcement Learning Approach for UAV Search Path Planning In Discrete Time and Space., , , , and . IWCMC, page 1437-1442. IEEE, (2024)Low-Cost Robots in the Internet of Things: Hardware, Software & Communication Aspects., , , and . EWSN, page 284-289. Junction Publishing, Canada / ACM, (2017)