Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dependency-Aware Computation Offloading in Mobile Edge Computing: A Reinforcement Learning Approach., , , and . IEEE Access, (2019)Detection of multipath routing with passive delay measurements: Hypothesis testing approaches., , , , and . Trans. Emerg. Telecommun. Technol., (2022)ABNN2: secure two-party arbitrary-bitwidth quantized neural network predictions., , , , , , and . DAC, page 361-366. ACM, (2022)Evaluating Network Boolean Tomography Under Byzantine Attacks., and . GLOBECOM, page 7574-7579. IEEE, (2023)Identify Congested Links Based on Enlarged State Space., , , , and . J. Comput. Sci. Technol., 31 (2): 350-358 (2016)Reinforcement Learning Empowered IDPS for Vehicular Networks in Edge Computing., , , , , and . IEEE Netw., 34 (3): 57-63 (2020)The Measurement Coverage for Boolean Tomography with Limited End Monitors.. iThings/GreenCom/CPSCom/SmartData, page 622-626. IEEE, (2018)Hole plastic scheme for geographic routing in wireless sensor networks., , and . ICC, page 6444-6449. IEEE, (2015)Cyberspace Surveying and Mapping: Hierarchical Model and Resource Formalization., , , , , , and . INFOCOM Workshops, page 68-72. IEEE, (2019)Impact of data to decision based on emergency plan., and . ICSAI, page 979-986. IEEE, (2014)