Author of the publication

A Malicious Attack Correlation Analysis Method Integrating Interaction Process of Source-Grid-Load System.

, , , , , and . CCIS, page 1101-1106. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generalized Doubly Robust Learning Framework for Debiasing Post-Click Conversion Rate Prediction., , , , , , , and . CoRR, (2022)Analysis of Human Factor in Air Traffic Control Unsafe Events Based on Improved DECIDE Model., , , and . HCI (5), volume 12185 of Lecture Notes in Computer Science, page 365-374. Springer, (2020)Design and implementation of data communication module based on plugin mode in configuration software., , , and . ICAIT, page 127-131. IEEE, (2017)Channel Modeling Optimization Based on Measurements at 26 GHz in an Open Office., , , , , and . Wireless Personal Communications, 100 (3): 1149-1161 (2018)Energy-Efficient UAV Communication with Trajectory Optimization., and . CoRR, (2016)UAV-Enabled Wireless Power Transfer: Trajectory Design and Energy Optimization., , and . CoRR, (2017)A General Design Framework for MIMO Wireless Energy Transfer with Limited Feedback., and . CoRR, (2015)Distributed Wireless Power Transfer with Energy Feedback., and . CoRR, (2016)Electromagnetic Lens-focusing Antenna Enabled Massive MIMO., , and . CoRR, (2013)Flexible grouping and multiple centers for preserving simplicity and flexibility in animation sketches., , , , , and . APCHI, page 73-82. ACM, (2013)