Author of the publication

Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach.

, , , , , and . Concurr. Comput. Pract. Exp., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Surface Sliding Mode Algorithm Based on Approximation for Three-Dimensional Trajectory Tracking Control of an AUV., , , and . ICONIP (1), volume 9947 of Lecture Notes in Computer Science, page 177-184. (2016)Securing instruction interaction for hierarchical management., , , , , and . J. Parallel Distributed Comput., (2020)A Moving Target Defense Approach for the Distributed Dynamic Network., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 336-343. IEEE, (2023)Adaptive NN Dynamic Surface Control for Stochastic Nonlinear Strict-Feedback Systems., , and . ISNN (2), volume 7952 of Lecture Notes in Computer Science, page 112-119. Springer, (2013)Adaptive NN control for a class of stochastic nonlinear systems with unmodeled dynamics using DSC technique., , , and . Neurocomputing, (2015)Output-Feedback Adaptive Neural Control for Stochastic Nonlinear Time-Varying Delay Systems With Unknown Control Directions., , , and . IEEE Trans. Neural Networks Learn. Syst., 26 (6): 1188-1201 (2015)Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach., , , , , and . ICCS (1), volume 12742 of Lecture Notes in Computer Science, page 525-539. Springer, (2021)Evaluating Indicator Weights for Satellite Internet Security Assessment: an Approach to Combining Rough Set with Fuzzy Hierarchical Analysis., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 482-490. IEEE, (2023)Adaptive neural control of pure-feedback stochastic nonlinear systems with multiple unknown time-varying delays., , and . IJCNN, page 4887-4894. IEEE, (2016)Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long?, , , , , , and . ICC, page 1-6. IEEE, (2020)