Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secrecy Energy Efficiency Maximization for UAV-Aided Communication Systems., , and . ICIRA (4), volume 11743 of Lecture Notes in Computer Science, page 41-51. Springer, (2019)Energy-Efficient Optimization for UAV-Aided Cellular Offloading., , , , and . IEEE Wirel. Commun. Lett., 8 (3): 769-772 (2019)An Overview of Intelligent Wireless Communications using Deep Reinforcement Learning., , , , and . J. Comm. Inform. Networks, 4 (2): 15-29 (2019)Application of the fuzzy neural network with inverse identification structure on neutralisation process., , , and . Int. J. Model. Identif. Control., 9 (1/2): 53-58 (2010)Micro-Supervised Disturbance Learning: A Perspective of Representation Probability Distribution., , , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 45 (6): 7542-7558 (June 2023)Compact geometric representation of qualitative directional knowledge., , , and . Knowl. Based Syst., (2020)An Incremental Algorithm for Handling Qualitative Spatio-Temporal Information., , , and . COSIT, volume 240 of LIPIcs, page 5:1-5:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Solving the data imbalance problem in network intrusion detection : A MP-CVAE based method., , , and . IWSDA, page 1-5. IEEE, (2022)Dimensionality reduction by soft-margin support vector machine., , , and . ICA, page 154-156. IEEE, (2017)Interpreting vulnerabilities of multi-instance learning to adversarial perturbations., , , , , and . Pattern Recognit., (October 2023)