Author of the publication

Push-Sum Distributed Online Optimization With Bandit Feedback.

, , , , and . IEEE Trans. Cybern., 52 (4): 2263-2273 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming., , and . IEEE Trans. Computers, 65 (1): 216-229 (2016)Dynamic Bandwidth Allocation for Preventing Congestion in Data Center Networks., , and . ISNN (3), volume 6677 of Lecture Notes in Computer Science, page 160-167. Springer, (2011)Towards an Efficient Algorithm to Reason over Description Logics Extended with Nominal Schemas., , and . RR, volume 7994 of Lecture Notes in Computer Science, page 65-79. Springer, (2013)Enhanced two-step spectrum sensing algorithm for OFDM signal., , and . CCECE, page 375-378. IEEE, (2011)Proof-carrying cloud computation: The case of convex optimization., , , , and . INFOCOM, page 610-614. IEEE, (2013)A hybrid framework combining solar energy harvesting and wireless charging for wireless sensor networks., , , and . INFOCOM, page 1-9. IEEE, (2016)Triple line-voltage cascaded VIENNA converter applied as the medium-voltage rectifier., , , and . IECON, page 1635-1641. IEEE, (2017)Privacy-preserving multi-keyword ranked search over encrypted cloud data., , , , and . INFOCOM, page 829-837. IEEE, (2011)Monocular visual SLAM for small UAVs in GPS-denied environments., , , , , and . ROBIO, page 896-901. IEEE, (2012)Stochastic mobile energy replenishment and adaptive sensor activation for perpetual wireless rechargeable sensor networks., , and . WCNC, page 974-979. IEEE, (2013)