Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A LSTM-Based Method for Comprehension and Evaluation of Network Security Situation., and . TrustCom/BigDataSE, page 723-728. IEEE, (2019)Joint Mode Selection and Transceiver Design for Device-to-Device Communications Underlaying Multi-User MIMO Cellular Networks., , , and . IEEE Trans. Wirel. Commun., 18 (6): 3312-3328 (2019)Deep-Reinforcement-Learning-Based Computation Offloading and Power Allocation Within Dynamic Platoon Network., , and . IEEE Internet Things J., 11 (6): 10500-10512 (March 2024)Network security situation assessment based on dual attention mechanism and HHO-ResNeXt., , and . Connect. Sci., (December 2023)Wireless and Service Allocation for Mobile Computation Offloading with Task Deadlines., , , and . CoRR, (2023)Network Security Situation Prediction of Improved Lanchester Equation Based on Time Action Factor., , and . Mob. Networks Appl., 26 (3): 1008-1023 (2021)A Study on Differences between Simplified and Traditional Chinese Based on Complex Network Analysis of the Word Co-Occurrence Networks., , , and . Comput. Intell. Neurosci., (2020)Cell nucleus elastography with the adjoint-based inverse solver., , , , , , , , and . Comput. Methods Programs Biomed., (December 2023)A versatile roaming service framework with billing support for WLAN/cellular integrated networks., , , and . QSHINE, page 38. ACM, (2007)Research on the Knowledge Map of Combat Simulation Domain Based on Relational Database., , , , , and . HCC, volume 12634 of Lecture Notes in Computer Science, page 319-325. Springer, (2020)