Author of the publication

Detection and Localization of Data Forgery Attacks in Automatic Generation Control.

, , , and . IEEE Access, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PoliteCamera: Respecting Strangers' Privacy in Mobile Photographing., , and . CoRR, (2020)MIMO techniques in WiMAX and LTE: a feature overview., , , , , , and . IEEE Commun. Mag., 48 (5): 86-92 (2010)Fusing Spatio-Temporal Contexts into DeepFM for Taxi Pick-Up Area Recommendation., , , , , , and . Comput. Syst. Sci. Eng., 45 (3): 2505-2519 (2023)An Integrated Framework for Multi-State Driver Monitoring Using Heterogeneous Loss and Attention-Based Feature Decoupling., , , , and . Sensors, 22 (19): 7415 (2022)Automated Detection of Design Patterns., and . GCC (2), volume 3033 of Lecture Notes in Computer Science, page 694-697. Springer, (2003)An iterative decoding scheme for pilot-assisted modulation in fading channels., , and . GLOBECOM, page 807-811. IEEE, (2000)Achieving k-anonymity in privacy-aware location-based services., , , , and . INFOCOM, page 754-762. IEEE, (2014)iHEMS: An information-centric approach to secure home energy management., , and . SmartGridComm, page 217-222. IEEE, (2012)An Investigation of the Nucleation/Crystallization Kinetics of Nanosized Colloidal Faujasite Zeolites, , and . Chem. Mater., 14 (3): 1319--1324 (March 2002)Evading User-Specific Offensive Web Pages via Large-Scale Collaborations., , , and . ICC, page 5721-5725. IEEE, (2008)