Author of the publication

Policy Poisoning Attacks on Transfer Learning Enabled Resource Allocation for Network Slicing.

, , , , , , and . GLOBECOM, page 6364-6370. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-enhanced Adaptive Attention Network for RGB- T Salient Object Detection., , , , and . IJCNN, page 1-8. IEEE, (2022)Attention-based Neighbor Selective Aggregation Network for Camouflaged Object Detection., , , , and . IJCNN, page 1-8. IEEE, (2022)Credit Scoring Based on Transaction Sequence Classification., , and . CyberC, IEEE, (2018)Pattern Recognition for Prosthetic Hand User's Intentions using EMG Data and Machine Learning Techniques., , , , and . AIM, page 544-550. IEEE, (2019)ADMM based algorithm for eICIC configuration in heterogeneous cellular networks., , , and . INFOCOM, page 343-351. IEEE, (2015)The effect of prediscussion note-taking in hidden profile tasks., , , and . J. Assoc. Inf. Sci. Technol., 69 (4): 566-577 (2018)Wind-Direction Mapping With a Modified Wind Spreading Function by Broad-Beam High-Frequency Radar., , , and . IEEE Geosci. Remote. Sens. Lett., 15 (5): 679-683 (2018)Resource Allocation for SVC Multicast over Wireless Relay Networks: RS Specification Function Based Simplification and Heuristics., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (11): 2089-2098 (2013)Variational Template Machine for Data-to-Text Generation., , , , and . ICLR, OpenReview.net, (2020)CGMH: Constrained Sentence Generation by Metropolis-Hastings Sampling., , , , and . CoRR, (2018)