共 111 条
[1]
Secure Quantum Steganography Protocol for Fog Cloud Internet of Things
[J].
IEEE ACCESS,
2018, 6
:10332-10340
[2]
Abdelhady AMA, 2020, VLC VIA INTELL UNPUB
[3]
COVID-19 Networking Demand: An Auction-Based Mechanism for Automated Selection of Edge Computing Services
[J].
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING,
2022, 9 (01)
:309-318
[4]
Akhtar R, 2020, EXTREME WEATHER EVENTS AND HUMAN HEALTH: INTERNATIONAL CASE STUDIES, P1, DOI 10.1007/978-3-030-23773-8
[5]
Al-Dulaimi A., 2018, 5G Networks: Fundamental Requirements, Enabling Technologies, and Operations Management
[6]
THE D-OMA METHOD FOR MASSIVE MULTIPLE ACCESS IN 6G Performance, Security, and Challenges
[J].
IEEE VEHICULAR TECHNOLOGY MAGAZINE,
2019, 14 (03)
:92-99
[7]
Sybil Defense Techniques in Online Social Networks: A Survey
[J].
IEEE ACCESS,
2017, 5
:1200-1219
[8]
[Anonymous], EURASIP J WIREL 0529
[10]
Wireless Communications Through Reconfigurable Intelligent Surfaces
[J].
IEEE ACCESS,
2019, 7
:116753-116773