Author of the publication

Deep Reinforcement Learning for Intelligent Computing and Content Edge Service in ICN-based IoV.

, , , and . ICC Workshops, page 1-7. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks., , and . IAS, page 155-160. IEEE, (2010)Power allocation over two identical Gilbert-Elliott channels., , and . ICC, page 5888-5892. IEEE, (2013)An Opportunistic Scheduling Algorithm for MPEG Video Over Shared Wireless Downlink., , and . ICC, page 872-877. IEEE, (2006)A neighborhood vector propagation algorithm for community detection., , and . GLOBECOM, page 2923-2928. IEEE, (2014)Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting., , , , and . IWDW, volume 6526 of Lecture Notes in Computer Science, page 211-223. Springer, (2010)A Dynamic Scheme For Authenticated Group Key Agreement Protocol., , , and . TeNe, page 245-250. Springer, (2008)Deep Reinforcement Learning for Intelligent Computing and Content Edge Service in ICN-based IoV., , , and . ICC Workshops, page 1-7. IEEE, (2021)KCC Method: Unknown Intrusion Detection Based on Open Set Recognition., , , and . ICTAI, page 1343-1347. IEEE, (2021)A Low Cost and Reliable Anonymity Scheme in P2P Reputation Systems with Trusted Third Parties., , , and . GLOBECOM, page 2201-2205. IEEE, (2008)A Grid Trust Model Based On MADM Theory., , , , and . GLOBECOM, page 2133-2137. IEEE, (2008)