From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security-Aware Service Function Chaining and Embedding With Asymmetric Dedicated Protection., , , , и . IEEE Access, (2024)RTIFed: A Reputation based Triple-step Incentive mechanism for energy-aware Federated learning over battery-constricted devices., , , , , , , , и . Comput. Networks, (2024)A Study on Application-Towards Bandwidth Guarantee Based on SDN., , , и . GLOBECOM Workshops, стр. 1-6. IEEE, (2016)Research on Design and Application of Mobile Edge Computing Model Based on SDN., , , , , и . ICCCN, стр. 1-6. IEEE, (2020)Mitigate Gender Bias in Construction: Fusion of Deep Reinforcement Learning-Based Contract Theory and Blockchain., , , , , , , и . Blockchain, стр. 86-91. IEEE, (2023)Value-aware meta-transfer learning and convolutional mask attention networks for reservoir identification with limited data., , , , , и . Expert Syst. Appl., (августа 2023)Delay-Aware and Energy-Efficient IoT Task Scheduling Algorithm With Double Blockchain Enabled in Cloud-Fog Collaborative Networks., , , , , и . IEEE Internet Things J., 11 (2): 3003-3016 (января 2024)Reinforcement learning based tasks offloading in vehicular edge computing networks., , , , , , и . Comput. Networks, (октября 2023)The Research on the Scheduling Method of Server in Data-Center., и . CSE/EUC (2), стр. 353-355. IEEE Computer Society, (2017)Research on scheduling method based on traffic matrix for IoT security., , , , , , , и . Int. J. Netw. Manag., (2021)