Author of the publication

Physical Layer Security Enabled Two-Stage AP Selection for Computation Offloading.

, , , , and . GLOBECOM, page 31-36. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative models for friendly jammer trustworthiness evaluation in IoT networks., , , , and . Ad Hoc Networks, (2022)Joint task offloading and resource allocation for secure OFDMA-based mobile edge computing systems., , , , and . Ad Hoc Networks, (February 2024)Transfer learning for process design with reinforcement learning., , , and . CoRR, (2023)Modeling Category-Selective Cortical Regions with Topographic Variational Autoencoders., , and . CoRR, (2021)DRL: A New Mobility Model in Mobile Social Networks., , , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 263-273. Springer, (2015)Cross-layer based intermittent jamming schemes for securing energy-constraint networks., , , , and . CoRR, (2021)Joint timeliness and security provisioning for enhancement of dependability in Internet of Vehicle system., , , and . Int. J. Distributed Sens. Networks, 18 (6): 155013292211052 (2022)A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers., , , , and . Wirel. Commun. Mob. Comput., (2017)Deep Echo State Q-Network Aided Trust Sharing Provisioning for Internet of Vehicle., , , and . IEEE Trans. Veh. Technol., 73 (3): 3993-4004 (March 2024)P-DRR: PPO-Based Efficient Dynamic Resource Reallocation Scheme in Industrial Internet of Things., , , , , , and . VTC Fall, page 1-5. IEEE, (2023)