Autor der Publikation

RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach.

, , , , , , , und . IEEE Trans. Intell. Transp. Syst., 24 (4): 4641-4650 (April 2023)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks., , , und . IEEE Trans. Ind. Informatics, 15 (9): 4957-4968 (2019)Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing., , , und . Quantum Inf. Process., 16 (8): 194 (2017)Consensus Adversarial Defense Method Based on Augmented Examples., , , , und . IEEE Trans. Ind. Informatics, 19 (1): 984-994 (2023)A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on Physically Unclonable Function Based Authentication Mechanisms for Internet of Medical Things., , und . IEEE Trans. Ind. Informatics, 18 (3): 1971-1980 (2022)Edge-Based Collaborative Training System for Artificial Intelligence-of-Things., , , , , , , , , und . IEEE Trans. Ind. Informatics, 18 (10): 7162-7173 (2022)An Efficient Data Aggregation Scheme for Privacy-Friendly Dynamic Pricing-Based Billing and Demand-Response Management in Smart Grids., und . IEEE Internet Things J., 5 (4): 3126-3135 (2018)A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation., und . Computer, 54 (11): 36-46 (2021)PhenoAuth: A Novel PUF-Phenotype-based Authentication Protocol for IoT Devices., , , , und . CoRR, (2024)Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication., , und . IACR Cryptol. ePrint Arch., (2022)Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids., und . IEEE Trans. Inf. Forensics Secur., 14 (6): 1554-1566 (2019)