Author of the publication

Adaptive Fault Isolation and System Reconfiguration Method for GNSS/INS Integration.

, , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WF3A: A N-shot website fingerprinting with effective fusion feature attention., , , , , and . Comput. Secur., (2024)Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems., , , and . Secur. Commun. Networks, (2019)HeteroTiC: A robust network flow watermarking based on heterogeneous time channels., , , , and . Comput. Networks, (2022)TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber-Physical Systems., , , , , and . IEEE Internet Things J., 8 (2): 1001-1015 (2021)Stealthy and Sparse False Data Injection Attacks Based on Machine Learning., , , , , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 337-347. Springer, (2019)Sequential collaborative detection strategy on ADS-B data attack., and . Int. J. Crit. Infrastructure Prot., (2019)Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users., , , , and . IEEE Trans. Veh. Technol., 69 (2): 1942-1955 (2020)Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping., , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Adaptive Fault Isolation and System Reconfiguration Method for GNSS/INS Integration., , , , and . IEEE Access, (2020)Dynamic temporal ADS-B data attack detection based on sHDP-HMM., , , , and . Comput. Secur., (2020)