Author of the publication

A Joint Optimization of Sensor Activation and Mobile Charging Scheduling in Industrial Wireless Rechargeable Sensor Networks.

, , , , and . ICC, page 3568-3573. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond Model-Level Membership Privacy Leakage: an Adversarial Approach in Federated Learning., , , , , and . ICCCN, page 1-9. IEEE, (2020)IVKMP: A robust data-driven heterogeneous defect model based on deep representation optimization learning., , , , and . Inf. Sci., (2022)Trajectory and Communication Design for Cache- Enabled UAVs in Cellular Networks: A Deep Reinforcement Learning Approach., , and . IEEE Trans. Mob. Comput., 22 (10): 6190-6204 (October 2023)Optimal Deployment and Scheduling of a Mobile Charging Station in the Internet of Electric Vehicles., , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 627-639. Springer, (2022)Battery state-of-charge estimation combining extended Kalman filter and RLS with adaptive directional forgetting., , , and . ICCA, page 365-370. IEEE, (2022)Collaborative Caching and Scheduling for Live Streaming in Mobile Edge Computing., , and . ICC, page 840-845. IEEE, (2023)Joint Resource Allocation and Trajectory Design for UAV-assisted Mobile Edge Computing Systems., , , , and . GLOBECOM, page 1-6. IEEE, (2020)Multi-objective Mobile Charging Scheduling on the Internet of Electric Vehicles: a DRL Approach., , , , , and . GLOBECOM, page 1-6. IEEE, (2021)Towards Model-Driven Methodology: a Novel Testing Approach for Collaborative Embedded System Design., , , and . CSCWD, page 112-116. IEEE, (2006)Towards a Systematic Conflict Resolution Policy in Multi-agent System: A Conceptual Framework., , , and . CSCWD (Selected papers), volume 3865 of Lecture Notes in Computer Science, page 274-283. Springer, (2005)