Author of the publication

A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications.

, , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 97-108. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DRL: A New Mobility Model in Mobile Social Networks., , , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 263-273. Springer, (2015)Deep Echo State Q-Network Aided Trust Sharing Provisioning for Internet of Vehicle., , , and . IEEE Trans. Veh. Technol., 73 (3): 3993-4004 (March 2024)Joint task offloading and resource allocation for secure OFDMA-based mobile edge computing systems., , , , and . Ad Hoc Networks, (February 2024)Quantitative models for friendly jammer trustworthiness evaluation in IoT networks., , , , and . Ad Hoc Networks, (2022)Cross-layer based intermittent jamming schemes for securing energy-constraint networks., , , , and . CoRR, (2021)Transfer learning for process design with reinforcement learning., , , and . CoRR, (2023)Modeling Category-Selective Cortical Regions with Topographic Variational Autoencoders., , and . CoRR, (2021)P-DRR: PPO-Based Efficient Dynamic Resource Reallocation Scheme in Industrial Internet of Things., , , , , , and . VTC Fall, page 1-5. IEEE, (2023)Joint timeliness and security provisioning for enhancement of dependability in Internet of Vehicle system., , , and . Int. J. Distributed Sens. Networks, 18 (6): 155013292211052 (2022)A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers., , , , and . Wirel. Commun. Mob. Comput., (2017)