Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust, Secure, and Cost-Effective Design for Cyber-Physical Systems., , and . IEEE Intelligent Systems, 29 (1): 66-69 (2014)Threshold structure of channel aware distributed scheduling in ad-hoc networks: An optimal stopping view.. CISS, page 486-491. IEEE, (2008)Semantic Communications for Wireless Sensing: RIS-Aided Encoding and Self-Supervised Decoding., , , , , , and . IEEE J. Sel. Areas Commun., 41 (8): 2547-2562 (August 2023)A New Look at AI-Driven NOMA-F-RANs: Features Extraction, Cooperative Caching, and Cache-Aided Computing., , , , and . IEEE Wirel. Commun., 29 (3): 123-130 (2022)Privacy-Preserving Database Assisted Spectrum Access for Industrial Internet of Things: A Distributed Learning Approach., , , , , and . IEEE Trans. Ind. Electron., 67 (8): 7094-7103 (2020)REAP: An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing., , , and . CoRR, (2017)A Game-theoretic Approach Towards Collaborative Coded Computation Offloading., , , , , , , and . CoRR, (2021)On the Tradeoff between Privacy and Distortion in Differential Privacy., , and . CoRR, (2014)Impact of Social Learning on Privacy-Preserving Data Collection., , and . CoRR, (2019)Location-aided routing with uncertainty in mobile ad hoc networks: A stochastic semidefinite programming approach., , and . Math. Comput. Model., 53 (11-12): 2192-2203 (2011)