Author of the publication

RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach.

, , , , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (4): 4641-4650 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CNN- and GAN-based classification of malicious code families: A code visualization approach., , , , , and . Int. J. Intell. Syst., 37 (12): 12472-12489 (December 2022)RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach., , , , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (4): 4641-4650 (April 2023)A new secure arrangement for privacy-preserving data collection., , , , and . Comput. Stand. Interfaces, (2022)Computationally Efficient Look-up-Tables for Behavioral Modelling and Digital Pre-distortion of Multi-standard Wireless Systems., , , , , and . CrownCom/WiCON, volume 427 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 39-55. Springer, (2021)IoT-based generalized multi-granulation sequential three-way decisions., , , , , and . Comput. Commun., (September 2023)An Accurate and Robust Approach of Device-Free Localization With Convolutional Autoencoder., , , , , and . IEEE Internet of Things Journal, 6 (3): 5825-5840 (2019)Lightweight Blockchain-Enhanced Mutual Authentication Protocol for UAVs., , , , , and . IEEE Internet Things J., 11 (6): 9547-9557 (March 2024)AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems., , , , , , and . Comput. Commun., (2022)Intrusion Detection Based on Device-Free Localization in the Era of IoT., , , , , and . Symmetry, 11 (5): 630 (2019)Interpretability-Based Cross-Silo Federated Learning., , , , and . CICAI (2), volume 14474 of Lecture Notes in Computer Science, page 545-556. Springer, (2023)