Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Artificial Intelligent Multi-Access Edge Computing Servers Management., , and . IEEE Access, (2020)Multimodal Learning in Cyber-Physical System: A Deep Dive with WSCC 9-Bus System., , , , , and . ISGT, page 1-5. IEEE, (2024)Resource Orchestration in Interference-Limited Small Cell Networks: A Contract-Theoretic Approach., , , and . NetGCooP, volume 1354 of Communications in Computer and Information Science, page 101-109. Springer, (2020)An Experiment in Software Decoy Design., , and . SEC, volume 250 of IFIP Conference Proceedings, page 253-264. Kluwer, (2003)A Graph Model Based Blockchain Implementation for Increasing Performance and Security in Decentralized Ledger Systems., , , , and . IEEE Access, (2020)Unified User Association and Contract-Theoretic Resource Orchestration in NOMA Heterogeneous Wireless Networks., , , and . IEEE Open J. Commun. Soc., (2020)Dynamic Role-Based Access Control Policy for Smart Grid Applications: An Offline Deep Reinforcement Learning Approach., , and . IEEE Trans. Hum. Mach. Syst., 52 (4): 761-773 (2022)Data Offloading in UAV-Assisted Multi-Access Edge Computing Systems Under Resource Uncertainty., , , and . IEEE Trans. Mob. Comput., 22 (1): 175-190 (2023)Local Trust in Internet of Things Based on Contract Theory., , , and . Sensors, 22 (6): 2393 (2022)Socio-aware Public Safety Framework Design: A Contract Theory based Approach., , , and . ICC, page 1-7. IEEE, (2020)