Author of the publication

A novel method to detect bad data injection attack in smart grid.

, , , , and . INFOCOM, page 3423-3428. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting community structure for undirected big graphs based on random walks., , , , and . WWW (Companion Volume), page 1151-1156. ACM, (2014)Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis., , , and . Trustcom/BigDataSE/ISPA, page 1054-1060. IEEE, (2016)On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study., , , and . ICB, page 378-383. IEEE, (2012)A hybrid algorithm for scheduling in job shop problem with flexible resources., , and . ICCA, page 1467-1472. IEEE, (2010)A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security., , and . ISNN (2), volume 3174 of Lecture Notes in Computer Science, page 657-662. Springer, (2004)Simulation-based Sensor Allocation for Dynamic Environment Estimation in Cyber-Physical Building System., , , , and . CASE, page 979-984. IEEE, (2019)Goal Orientation in Music Composition and Other Social Behaviors Leading to the Common Quantitative Law., and . IEEE Trans. Comput. Soc. Syst., 10 (1): 388-402 (February 2023)LogLog Filter: Filtering Cold Items within a Large Range over High Speed Data Streams., , , , , and . ICDE, page 804-815. IEEE, (2021)Efficient topology optimization for a wired networked system by adding wireless communication., , , and . ACC, page 448-453. IEEE, (2012)EV charging load scheduling with high wind power penetration: A robust shortest path approach., , and . ACC, page 2765-2770. IEEE, (2015)