Author of the publication

On Designing Learning Control Scheme for Multilayer Supply Chain Networks With Constraints.

, , , , and . IEEE Trans. Syst. Man Cybern. Syst., 52 (12): 7422-7430 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang., and . CyberSA, page 1-7. IEEE, (2019)Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept., , and . ICISSP (Revised Selected Papers), volume 1221 of Communications in Computer and Information Science, page 272-287. Springer, (2019)Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study., , and . ICISSP, page 369-376. SCITEPRESS, (2020)Stability analysis of two-dimensional neutral-type Cohen-Grossberg BAM neural networks., , and . Neural Comput. Appl., 28 (4): 703-716 (2017)A New Estimator for a Population Proportion Using Group Testing., and . Commun. Stat. Simul. Comput., 45 (1): 101-114 (2016)Stabilization and oscillations design for a family of cyclic boolean networks via nodes connection., , , and . Neurocomputing, (2019)Threat modeling - A systematic literature review., and . Comput. Secur., (2019)Synchronization of Hierarchical Time-Varying Neural Networks Based on Asynchronous and Intermittent Sampled-Data Control., , , and . IEEE Trans. Neural Networks Learn. Syst., 28 (11): 2837-2843 (2017)Global asymptotic stability of switched boolean networks with missing data., , and . J. Frankl. Inst., 360 (9): 6321-6337 (June 2023)Properties and structural analyses of USA's regional electricity market: A visibility graph network approach., , , , and . Appl. Math. Comput., (2020)