Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Slicing with Mobile Edge Computing for Micro-Operator Networks in Beyond 5G., , , and . WPMC, page 352-357. IEEE, (2018)Toward an Automated Auction Framework for Wireless Federated Learning Services Market., , , , and . CoRR, (2019)Distributed Learning for Channel Allocation Over a Shared Spectrum., , , and . IEEE J. Sel. Areas Commun., 37 (10): 2337-2349 (2019)A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing., , , , and . IEEE Trans. Dependable Secur. Comput., 16 (4): 565-579 (2019)IRS-Based Wireless Jamming Attacks: When Jammers Can Attack Without Power., , , , and . IEEE Wirel. Commun. Lett., 9 (10): 1663-1667 (2020)Probabilistic Cache Placement in UAV-Assisted Networks With D2D Connections: Performance Analysis and Trajectory Optimization., , , and . IEEE Trans. Commun., 68 (10): 6331-6345 (2020)Ambient Backscatter Communications: A Contemporary Survey., , , , , and . IEEE Commun. Surv. Tutorials, 20 (4): 2889-2922 (2018)UAV-Aided Covert Communication With a Multi-Antenna Jammer., , , , , and . IEEE Trans. Veh. Technol., 70 (11): 11619-11631 (2021)Efficient Dynamic Distributed Resource Slicing in 6G Multi-Access Edge Computing Networks With Online ADMM and Message Passing Graph Neural Networks., , and . IEEE Trans. Mob. Comput., 23 (4): 2614-2638 (April 2024)On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach., , , , , and . IEEE Trans. Serv. Comput., 14 (5): 1492-1504 (2021)