毕远国
开通时间:..
最后更新时间:..
扫描访问手机版
点击次数:
第一作者:Zixuan Huang
通讯作者:Yuanguo Bi
合写作者:Kuan Zhang, et al
发表刊物:IEEE Transactions on Information Forensics and Security (CCF A)
论文类型:SCI
是否译文:否
上一条:Service Satisfaction-Aware Adaptive Service Migration and Resource Allocation in Vehicular Edge Computing
下一条:Trajectory Optimization and Power Allocation for Multi-UAV Wireless Networks: A Communication-Based Multi-Agent Deep Reinforcement Learning Approach