Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reward-Punishment based User Utility Maximization Model for Optimal Real-time Pricing in Electricity Energy Supply., , , , and . ISGT, page 1-5. IEEE, (2020)Reward fairness-based optimal distributed real-time pricing to enable supply-demand matching., , , , and . Neurocomputing, (2021)Characterization and simulation of the effect of road dirt on the performance of a laser scanner., , , , , , and . ITSC, page 1-6. IEEE, (2017)Super-Wideband SSN Suppression in High-Speed Digital Communication Systems by Using Multi-Via Electromagnetic Bandgap Structures., , , and . ICC, page 2648-2653. IEEE, (2007)Multi-View Triangulation: Systematic Comparison and an Improved Method., , , , , and . IEEE Access, (2020)Dual-collaborative DoS/DDoS mitigation approach in information-centric mobile Internet., , and . Int. J. Commun. Syst., (2020)QMORA: A Q-Learning based Multi-objective Resource Allocation Scheme for NFV Orchestration., , , and . VTC Spring, page 1-6. IEEE, (2020)Communication with causal CSI and controlled information outage., and . IEEE Trans. Wirel. Commun., 8 (5): 2221-2229 (2009)A Data-reversible Hiding Algorithm in WSNs., and . J. Networks, 8 (9): 2037-2042 (2013)Efficient Node Coverage Scheme of Wireless Sensor Network under Multi-Constraint Conditions., and . J. Networks, 8 (10): 2277-2284 (2013)