Author of the publication

Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model.

, , , and . J. Ambient Intell. Humaniz. Comput., 12 (9): 8859-8866 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network covert timing channel with distribution matching., , and . Telecommun. Syst., 49 (2): 199-205 (2012)Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework., , , , and . IEEE Access, (2020)Network Packet Length Covert Channel Based on Empirical Distribution Function., , and . J. Networks, 9 (6): 1440-1446 (2014)Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking., , , , , and . Secur. Commun. Networks, (2018)Detecting JitterBug covert timing channel with sparse embedding., , , and . Secur. Commun. Networks, 9 (11): 1509-1519 (2016)Secure multimedia watermarking authentication in wavelet domain., , , , , and . J. Electronic Imaging, 17 (3): 033010 (2008)GANs-LSTM Model for Soil Temperature Estimation From Meteorological: A New Approach., , , , , , and . IEEE Access, (2020)Intradialytic hypotension prediction using covariance matrix-driven whale optimizer with orthogonal structure-assisted extreme learning machine., , , , , , , , and . Frontiers Neuroinformatics, (2022)Route Optimization Algorithm Based on Game Theory for Tourism Routes at Pseudo-Imperial Palace., , , , and . J. Inf. Process. Syst., 17 (5): 879-891 (2021)GAN-generated fake face detection via two-stream CNN with PRNU in the wild., , , , , , and . Multim. Tools Appl., 81 (29): 42527-42545 (2022)