Author of the publication

Reinforcement Learning-Based NOMA Power Allocation in the Presence of Smart Jamming.

, , , , and . IEEE Trans. Vehicular Technology, 67 (4): 3377-3389 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Event-based exploration and comparison on time-varying ensembles., , , and . J. Vis., 23 (1): 111-123 (2020)Improved Performance with Adaptive Dly-ACK for IEEE 802.15.3 WPAN over UWB PHY., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (9): 2364-2372 (2005)A Ground-Roll Separation Method Based on Neural Networks With Morphological Similarity Loss., , , and . IEEE Geosci. Remote. Sens. Lett., (2023)OP-Synthetic: identification of optimal genetic manipulations for the overproduction of native and non-native metabolites., , and . Quant. Biol., 2 (3): 100-109 (2014)Reinforcement Learning-Based NOMA Power Allocation in the Presence of Smart Jamming., , , , and . IEEE Trans. Vehicular Technology, 67 (4): 3377-3389 (2018)Classification of Nuclear Receptor Subfamilies with RBF Kernel in Support Vector Machine., and . ISNN (3), volume 3498 of Lecture Notes in Computer Science, page 680-685. Springer, (2005)Support Vector Machine Approach for Retained Introns Prediction Using Sequence Features., , and . ISNN (2), volume 3973 of Lecture Notes in Computer Science, page 654-659. Springer, (2006)Constrained Optimization Using Triple Spaces Cultured Genetic Algorithm., and . ICNC (6), page 589-593. IEEE Computer Society, (2008)Mobile cloud offloading for malware detections with learning., , , and . INFOCOM Workshops, page 197-201. IEEE, (2015)Game theoretic study of protecting MIMO transmissions against smart attacks., , , and . ICC, page 1-6. IEEE, (2017)