Author of the publication

Task and Bandwidth Allocation for UAV-Assisted Mobile Edge Computing with Trajectory Design.

, , , and . GLOBECOM, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accurate and Fast Detection of DDoS Attacks in High-Speed Network with Asymmetric Routing., , , , and . GLOBECOM, page 1-6. IEEE, (2021)Detecting Cryptojacking Traffic Based on Network Behavior Features., , , , and . GLOBECOM, page 1-6. IEEE, (2021)Verifying Privacy-Preserving Financing Orders on a Consortium Blockchain Based on zk-SNARKs., , , , , , and . WCNC, page 1527-1532. IEEE, (2022)Accurate Identification of Encrypted Videos in Asymmetric Routing Scenarios., , , , and . APNOMS, page 310-313. IEEE, (2023)Footprint Analysis and Motion Synthesis., and . ICCSA (3), volume 3482 of Lecture Notes in Computer Science, page 235-244. Springer, (2005)SRLA: A real time sliding time window super point cardinality estimation algorithm for high speed network based on GPU., , and . CoRR, (2018)STAR-RIS Assisted Secret Key Generation: Joint Active and Passive Precoding Design., , , , , and . VTC Fall, page 1-6. IEEE, (2023)Detecting Cryptomining Traffic Over an Encrypted Proxy Based on K-S Test., , , , and . ICC, page 3787-3792. IEEE, (2023)A Novel Darknet Traffic Classification Method Based on Knowledge Graph with Dynamic Embedding Learning., , , , and . ICC, page 3799-3804. IEEE, (2023)IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks., , , , and . ICC, page 4168-4173. IEEE, (2022)