Energy-efficient deep reinforcement learning assisted resource allocation for 5G-RAN slicing Y Azimi, S Yousefi, H Kalbkhani, T Kunz IEEE Transactions on Vehicular Technology 71 (1), 856-871, 2021 | 49 | 2021 |
Applications of Machine Learning in Resource Management for RAN-Slicing in 5G and Beyond Networks: A Survey Y Azimi, S Yousefi, H Kalbkhani, T Kunz IEEE Access 10, 106581 - 106612, 2022 | 32 | 2022 |
Improvement of quadratic residues based scheme for authentication and privacy in mobile RFID Y Azimi, J Bagherzadeh 2015 7th Conference on Information and Knowledge Technology (IKT), 1-6, 2015 | 3 | 2015 |
Mobility aware and energy-efficient federated deep reinforcement learning assisted resource allocation for 5G-RAN slicing Y Azimi, S Yousefi, H Kalbkhani, T Kunz Computer Communications 217, 166-182, 2024 | | 2024 |
DISTRIBUTED AND COLLABORATIVE DETECTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKS Y AZIMI, V HASHEMIFARD, J BAGHERZADEH TABRIZ JOURNAL OF ELECTRICAL ENGINEERING 46 (4), 195-206, 2017 | | 2017 |
تشخیص توزیعشده و مشارکتی حمله کرمچاله در شبکههای حسگر بیسیم یاسر عظیمی, وحید هاشمی فرد, وحید, باقرزاده مجله مهندسی برق دانشگاه تبریز 46 (4), 195-206, 2016 | | 2016 |
Improvement of minimum disclosure approach to authentication and privacy in RFID systems MHF Kordlar, Y Azimi 2015 7th Conference on Information and Knowledge Technology (IKT), 1-6, 2015 | | 2015 |
De-Synchronization attack on the Hash-based mutual authentication protocol Y Azimi, A Mirzaei, MH Fathi | | |