Author of the publication

Dynamic spectrum management for heterogeneous UAV networks with navigation data assistance.

, , , and . WCNC, page 1078-1083. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Deep Reinforcement Learning-based Trust Management Scheme for Software-defined Vehicular Networks., , , and . DIVANet@MSWiM, page 1-7. ACM, (2018)Channel estimation using weighted switching of multiple models., , , , and . ChinaCom, page 232-237. IEEE Computer Society, (2015)Parallel Offloading and Resource Optimization for Multi-Hop Ad Hoc Network-Enabled CBTC With Mobile Edge Computing., , , , , , and . IEEE Trans. Veh. Technol., 73 (2): 2684-2698 (2024)Blockchain-Based Intelligence Networking for Cooperative Positioning Towards Future Internet of Vehicles., , , and . IEEE Trans. Veh. Technol., 73 (3): 3262-3276 (March 2024)Traffic-aware resource allocation scheme for mMTC in dynamic TDD systems., , , and . IET Commun., 12 (15): 1910-1918 (2018)Sharded Blockchain for Collaborative Computing in the Internet of Things: Combined of Dynamic Clustering and Deep Reinforcement Learning Approach., , , , , and . IEEE Internet Things J., 9 (17): 16494-16509 (2022)Energy-Efficient Resource Allocation for MEC and Blockchain-Enabled IoT via CRL Approach., , , , , and . GLOBECOM, page 843-848. IEEE, (2022)Resource Allocation Policy of Primary Users in Proactively-Optimization Cognitive Radio Networks., , , and . CICSyN, page 343-347. IEEE Computer Society, (2011)DECISIVE: Designing Critical Systems With Iterative Automated Safety Analysis., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (5): 1346-1359 (May 2024)Iterative Channel Estimation and Detection for High-Mobility MIMO-OFDM Systems: Mitigating Error Propagation by Exploiting Error Information., , , , and . Wireless Personal Communications, 84 (3): 1907-1931 (2015)