Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobility-Aware Cooperative Caching in Vehicular Edge Computing Based on Asynchronous Federated and Deep Reinforcement Learning., , , , , and . IEEE J. Sel. Top. Signal Process., 17 (1): 66-81 (January 2023)High stable and accurate vehicle selection scheme based on federated edge learning in vehicular networks., , , , , and . CoRR, (2022)Power control based time-domain inter-cell interference coordination scheme in DSCNs., , , and . ICC, page 1-6. IEEE, (2016)Non-contact remote estimation of cardiovascular parameters., and . Biomed. Signal Process. Control., (2018)Two-stage salient region detection by exploiting multiple priors., and . J. Vis. Commun. Image Represent., 25 (8): 1823-1834 (2014)Cross-Project Issue Classification Based on Ensemble Modeling in a Social Coding World., , , , , , and . ICONIP (4), volume 11304 of Lecture Notes in Computer Science, page 281-292. Springer, (2018)Decision-making method of transient stability control for power system considering the uncertainty of wind power., , , , , and . ICISCAE, page 7-13. IEEE, (2023)RepoLike: personal repositories recommendation in social coding communities., , , , and . Internetware, page 54-62. ACM, (2016)Network Security Situation Assessment Based on HMM., , , , , and . ICIC (2), volume 6839 of Lecture Notes in Computer Science, page 387-394. Springer, (2011)The construction of general type-2 fuzzy sets., , and . GrC, page 141-146. IEEE Computer Society, (2013)