Author of the publication

A Malicious Attack Correlation Analysis Method Integrating Interaction Process of Source-Grid-Load System.

, , , , , and . CCIS, page 1101-1106. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sustainable Circular Business Model for Transparency and Uncertainty Reduction in Supply Chain Management., , , , and . J. Theor. Appl. Electron. Commer. Res., 16 (4): 959-975 (2021)Universal Interactive Verification Framework for Federated Learning Protocol., , , and . ICNCC, page 108-113. ACM, (2021)Deep Reinforcement Learning based Green Resource Allocation Mechanism in Edge Computing driven Power Internet of Things., , , , , , , , , and . IWCMC, page 388-393. IEEE, (2020)A Novel CP-ABE Based Sidechain Protocol for Distributed Power System Data Storage Management with the Blockchain., , , and . CONF-CDS, page 69:1-69:8. ACM, (2021)Access Control of Cloud Service Based on UCON., , and . CloudCom, volume 5931 of Lecture Notes in Computer Science, page 559-564. Springer, (2009)A Case Study: Students' Perception of a Collaborative Game-Based Virtual Learning Environment., , and . iLRN, page 46-53. IEEE, (2020)A Malicious Attack Correlation Analysis Method Integrating Interaction Process of Source-Grid-Load System., , , , , and . CCIS, page 1101-1106. IEEE, (2018)A Novel GAN based User Desensitization Data Generation Algorithm., , and . EITCE, page 1068-1074. ACM, (2021)A JPEG compression-resistant data watermark embedding and detection algorithm., , , and . EITCE, page 1219-1226. ACM, (2021)