Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A traffic pattern detection algorithm based on multimodal sensing., , , , and . IJDSN, (2018)A Particle Filter-Based Reinforcement Learning Approach for Reliable Wireless Indoor Positioning., , , and . IEEE J. Sel. Areas Commun., 37 (11): 2457-2473 (2019)Reinforced-LSTM Trajectory Prediction-Driven Dynamic Service Migration: A Case Study., , , , , , , , and . IEEE Trans. Netw. Sci. Eng., 9 (4): 2786-2802 (2022)Enhancing Sensing and Decision-Making of Automated Driving Systems With Multi-Access Edge Computing and Machine Learning., , , , , and . IEEE Intell. Transp. Syst. Mag., 14 (1): 44-56 (2022)Mobile Users Location Prediction with Complex Behavior Understanding., , , and . LCN, page 323-326. IEEE, (2018)Smart Unmanned Aerial Vehicles as base stations placement to improve the mobile network operations., , , , , , , and . Comput. Commun., (2022)Deep Reinforcement Learning Based Resource Allocation in Multi-UAV-Aided MEC Networks., , , , , , and . IEEE Trans. Commun., 71 (1): 296-309 (2023)Effective Safety Message Dissemination with Vehicle Trajectory Predictions in V2X Networks., , , and . Sensors, 22 (7): 2686 (2022)Game Theoretic Optimal User Association in Emergency Networks., , , and . ADHOC-NOW, volume 11803 of Lecture Notes in Computer Science, page 18-31. Springer, (2019)On Attacks To Federated Learning and a Blockchain-empowered Protection., , , and . CCNC, page 1-6. IEEE, (2022)