Follow
Yaser Azimi
Yaser Azimi
Verified email at urmia.ac.ir
Title
Cited by
Cited by
Year
Energy-efficient deep reinforcement learning assisted resource allocation for 5G-RAN slicing
Y Azimi, S Yousefi, H Kalbkhani, T Kunz
IEEE Transactions on Vehicular Technology 71 (1), 856-871, 2021
332021
Applications of Machine Learning in Resource Management for RAN-Slicing in 5G and Beyond Networks: A Survey
Y Azimi, S Yousefi, H Kalbkhani, T Kunz
IEEE Access 10, 106581 - 106612, 2022
252022
Improvement of quadratic residues based scheme for authentication and privacy in mobile RFID
Y Azimi, J Bagherzadeh
2015 7th Conference on Information and Knowledge Technology (IKT), 1-6, 2015
32015
Mobility aware and energy-efficient federated deep reinforcement learning assisted resource allocation for 5G-RAN slicing
Y Azimi, S Yousefi, H Kalbkhani, T Kunz
Computer Communications 217, 166-182, 2024
2024
DISTRIBUTED AND COLLABORATIVE DETECTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKS
Y AZIMI, V HASHEMIFARD, J BAGHERZADEH
TABRIZ JOURNAL OF ELECTRICAL ENGINEERING 46 (4), 195-206, 2017
2017
تشخیص توزیع‌شده و مشارکتی حمله کرم‌چاله در شبکه‌های حسگر بی‌سیم
یاسر عظیمی, وحید هاشمی فرد, وحید, باقرزاده
مجله مهندسی برق دانشگاه تبریز 46 (4), 195-206, 2016
2016
Improvement of minimum disclosure approach to authentication and privacy in RFID systems
MHF Kordlar, Y Azimi
2015 7th Conference on Information and Knowledge Technology (IKT), 1-6, 2015
2015
De-Synchronization attack on the Hash-based mutual authentication protocol
Y Azimi, A Mirzaei, MH Fathi
The system can't perform the operation now. Try again later.
Articles 1–8