A novel revocable and identity-based conditional proxy re-encryption scheme with ciphertext evolution for secure cloud data sharing S Yao, RVJ Dayot, HJ Kim, IH Ra IEEE Access 9, 42801-42816, 2021 | 27 | 2021 |
An identity-based proxy re-encryption scheme with single-hop conditional delegation and multi-hop ciphertext evolution for secure cloud data sharing S Yao, RVJ Dayot, IH Ra, L Xu, Z Mei, J Shi IEEE Transactions on Information Forensics and Security 18, 3833-3848, 2023 | 10 | 2023 |
Slice Admission and Deployment Strategies in Resource-Constrained 5G Network Slices using an Actor-Critic Approach RVJ Dayot, IH Ra 2022 Joint 12th International Conference on Soft Computing and Intelligent …, 2022 | 3 | 2022 |
A Deep Contextual Bandit-Based End-to-End Slice Provisioning Approach for Efficient Allocation of 5G Network Resources RVJ Dayot, IH Ra, HJ Kim Network 2 (3), 370-388, 2022 | 2 | 2022 |
Determining prosumer energy generation performance as basis for peer-to-peer energy trading decisions using monte carlo simulation RV Voltaire Dayot, H Kim, IH Ra The 9th International Conference on Smart Media and Applications, 258-262, 2020 | 1 | 2020 |
Request Scheduling and Resource Allocation in 5G Network Slices using Deep Deterministic Policy Gradient Reinforcement Learning RVJ Dayot, IH Ra 한국콘텐츠학회 ICCC 논문집, 173-174, 2022 | | 2022 |
Load Forecasting and Clustering of Prosumer/Consumer Energy Consumption and Generation Patterns for Demand Response Measures in Community Microgrids RVJ Dayot, IH Ra 한국콘텐츠학회 ICCC 논문집, 133-134, 2020 | | 2020 |
Cooperative Peer-to-Peer Energy Trading using a Hive Strategy for Small Microgrid Communities RVJ Dayot, IH Ra Smart Media Journal 9 (3), 52-58, 2020 | | 2020 |
Multi-Armed Bandit-based Network Slice Admission and Control in 5G and Beyond Networks RVJ Dayot, IH Ra | | |