Browsing by Author Wang, P

Showing results 1 to 20 of 54  next >
Issue DateTitleAuthor(s)
1-Mar-2019Increasing speech intelligibility in monaural hearing by adding noise at the other earWang, K; Wang, P; Qiu, X
20-Feb-2019Reinforcement Learning Approach for RF-Powered Cognitive Radio Network with Ambient BackscatterHuynh, NV; Hoang, DT; Nguyen, DN; Dutkiewicz, E; Niyato, D; Wang, P
1-Jan-2019A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain NetworksWang, W; Hoang, DT; Hu, P; Xiong, Z; Niyato, D; Wang, P; Wen, Y; Kim, DI
1-Oct-2018A dynamic edge caching framework for mobile 5G networksHoang, DT; Niyato, D; Nguyen, DN; Dutkiewicz, E; Wang, P; Han, Z
1-Oct-2018Optimal Time Scheduling for Wireless-Powered Backscatter Communication NetworksVan Huynh, N; Hoang, DT; Niyato, D; Wang, P; Kim, DI
1-Oct-2018Ambient backscatter communications: A contemporary surveyVan Huynh, N; Hoang, DT; Lu, X; Niyato, D; Wang, P; Kim, DI
1-Aug-2018Stackelberg game for distributed time scheduling in RF-powered backscatter cognitive radio networksWang, W; Hoang, DT; Niyato, D; Wang, P; Kim, DI
23-Jun-2018Unified Fine-grained Access Control for Personal Health Records in Cloud ComputingLi, W; Liu, BM; Liu, D; Liu, RP; Wang, P; Luo, S; Ni, W
19-Jun-2018Performance Analysis and Application of Mobile BlockchainSuankaewmanee, K; Hoang, DT; Niyato, D; Sawadsitang, S; Wang, P; Han, Z
8-Jun-2018Cyberattack detection in mobile cloud computing: A deep learning approachNguyen, KK; Hoang, DT; Niyato, D; Wang, P; Nguyen, D; Dutkiewicz, E
8-Jun-2018A stochastic programming approach for risk management in mobile cloud computingHoang, DT; Niyato, D; Wang, P; Wang, SS; Nguyen, D; Dutkiewicz, E
8-Feb-2018Optimal cost-based cyber insurance policy management for mobile servicesHoang, DT; Niyato, D; Wang, P
1-Jan-2018Pathways to Legalizing Same-Sex Marriage in China and Taiwan: Globalization and “Chinese Values’Jeffreys, E; Wang, P; Winter, B; Forest, M; Senac, R
1-Jan-2018Investigation on the influence of the interau-ral phase difference on the sound localization and auditory source width at different frequency bandsWang, P; Lin, Z; Qiu, X
1-Dec-2017Temporal Pyramid Pooling-Based Convolutional Neural Network for Action RecognitionWang, P; Cao, Y; Shen, C; Liu, L; Shen, HT
14-Nov-2017Fine-Grained Access Control for Personal Health Records in Cloud ComputingLi, W; Ni, W; Liu, D; Liu, RP; Wang, P; Luo, S
6-Nov-2017Multi-attention network for one shot learningWang, P; Liu, L; Shen, C; Huang, Z; Van Den Hengel, A; Shen, HT
1-Oct-2017Applications of Economic and Pricing Models for Wireless Network Security: A SurveyLuong, NC; Hoang, DT; Wang, P; Niyato, D; Han, Z
1-Sep-2017Ambient Backscatter: A New Approach to Improve Network Performance for RF-Powered Cognitive Radio NetworksHoang, DT; Niyato, D; Wang, P; Kim, DI; Han, Z
28-Jul-2017Optimal time sharing in RF-powered backscatter cognitive radio networksHoang, DT; Niyato, D; Wang, P; Kim, DI