Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sustainable Service Allocation Using a Metaheuristic Technique in a Fog Server for Industrial Applications., , , , and . IEEE Trans. Ind. Informatics, 14 (10): 4497-4506 (2018)Optimal and Low-Complexity Dynamic Spectrum Access for RF-Powered Ambient Backscatter System With Online Reinforcement Learning., , , , , and . IEEE Trans. Commun., 67 (8): 5736-5752 (2019)Enabling Technologies for Ultra-Reliable and Low Latency Communications: From PHY and MAC Layer Perspectives., , , , , , , , , and 1 other author(s). IEEE Commun. Surv. Tutorials, 21 (3): 2488-2524 (2019)Maximizing the Geometric Mean of User-Rates to Improve Rate-Fairness: Proper vs. Improper Gaussian Signaling., , , , and . IEEE Trans. Wirel. Commun., 21 (1): 295-309 (2022)Elastic Resource Allocation for Coded Distributed Computing Over Heterogeneous Wireless Edge Networks., , , , , , and . IEEE Trans. Wirel. Commun., 22 (4): 2636-2649 (April 2023)Defeating Super-Reactive Jammers With Deception Strategy: Modeling, Signal Detection, and Performance Analysis., , , , , and . IEEE Trans. Wirel. Commun., 21 (9): 7374-7390 (2022)Transfer Learning for Future Wireless Networks: A Comprehensive Survey., , , , , , , , , and . CoRR, (2021)Deep Transfer Learning: A Novel Collaborative Learning Model for Cyberattack Detection Systems in IoT Networks., , , , , , , and . CoRR, (2021)Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems., , , , , and . CoRR, (2023)Jointly Optimize Coding and Node Selection for Distributed Computing over Wireless Edge Networks., , , , and . CoRR, (2021)