Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry., , and . IEEE Trans. Signal Process., 64 (13): 3429-3443 (2016)Channel correlation modeling for link signature security assessment., , , and . HotSoS, page 25. ACM, (2014)Secure UAV Communication Networks via Friendly Jamming and Bandwidth Allocation., , and . INFOCOM Workshops, page 894-899. IEEE, (2020)D2D网络中基于分簇的无线资源分配机制 (Cluster-based Radio Resource Allocation Mechanism in D2D Networks)., , , , and . 计算机科学, 45 (9): 123-128 (2018)Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing., , and . IEEE Trans. Wirel. Commun., 19 (6): 4054-4066 (2020)Toward Proper Guard Zones for Link Signature., , , , and . IEEE Trans. Wirel. Commun., 15 (3): 2104-2117 (2016)Privacy-Aware Task Offloading via Two-Timescale Reinforcement Learning., , and . ICCC, page 220-225. IEEE, (2020)Space Pruning Based Time Minimization in Delay Constrained Multi-Task UAV-Based Sensing., , , and . IEEE Trans. Veh. Technol., 70 (3): 2836-2849 (2021)Minimizing the Age of Information in the Presence of Location Privacy-Aware Mobile Agents., , and . IEEE Trans. Commun., 69 (2): 1053-1067 (2021)Physical-Layer Assisted Privacy-Preserving Offloading in Mobile-Edge Computing., , and . ICC, page 1-6. IEEE, (2019)