From post

Research Challenges and Security Threats to AI-Driven 5G Virtual Emotion Applications Using Autonomous Vehicles, Drones, and Smart Devices.

, , , , и . IEEE Netw., 34 (6): 288-294 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11., , , и . UNet, том 10542 из Lecture Notes in Computer Science, стр. 38-47. Springer, (2017)Performance evaluation of security mechanisms in RAOLSR protocol for Wireless Mesh Networks., , и . ICC, стр. 1808-1812. IEEE, (2014)An enhanced two level scheduler to increase multimedia services performance in LTE networks., , и . ICC, стр. 2351-2356. IEEE, (2014)On resilient event-driven partial barriers in mobile sensor networks., и . ICC, стр. 1-6. IEEE, (2016)Channel Assignment for D2D communication : A Regret Matching Based Approach., , и . IWCMC, стр. 322-327. IEEE, (2018)Optimal distributed relay selection for duty-cycling Wireless Sensor Networks., , , и . GLOBECOM, стр. 145-150. IEEE, (2012)Packet dropping for real-time applications in wireless networks., , и . ICC, стр. 2949-2953. IEEE, (2013)REFIACC Scheme Evaluation Using Analytical Modeling., , , , и . WCNC, стр. 1-6. IEEE, (2017)Performance evaluation of security routing strategies to avoid DoS attacks in WSN., и . GLOBECOM, стр. 2859-2863. IEEE, (2012)On Construction of Collision-Free UAV Reinforced Barrier., , и . GLOBECOM, стр. 1-6. IEEE, (2016)