Author of the publication

Blockchain-Empowered Resource Allocation in Multi-UAV-Enabled 5G-RAN: A Multi-Agent Deep Reinforcement Learning Approach.

, , , , , and . IEEE Trans. Cogn. Commun. Netw., 9 (4): 991-1011 (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Execution of A Requirement Model in Software Development., , , , and . IASSE, page 203-208. ISCA, (2004)Enabling Smart Cloud Services Through Remote Sensing: An Internet of Everything Enabler., , , and . IEEE Internet of Things Journal, 1 (3): 276-288 (2014)Social interaction increases capacity of wireless networks., , and . IWCMC, page 467-472. IEEE, (2013)Failure Prediction Based on Multi-Scale Frequent Anomalous Behavior Identification in Support of Autonomic Networks., , , and . GLOBECOM, page 1-5. IEEE, (2010)LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT., , , , , and . CoRR, (2018)Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs)., , , and . IEEE Access, (2019)g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices., , , , , and . IEEE Trans. Consumer Electronics, 65 (2): 215-223 (2019)3D Beamforming With Massive Cylindrical Arrays for Physical Layer Secure Data Transmission., , , , , and . IEEE Communications Letters, 23 (5): 830-833 (2019)CUDA-accelerated task scheduling in vehicular clouds with opportunistically available V2I., , , and . ICC, page 1-6. IEEE, (2017)Opportunistic access for cooperative cognitive radio networks with requirement constraint., , , and . ICC, page 6317-6321. IEEE, (2013)