Author of the publication

Modelling Cyber Attacks on Electricity Market Using Mathematical Programming With Equilibrium Constraints.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Document Reverse Engineering: From Paper to XML., , , , and . Document Analysis Systems, volume 2423 of Lecture Notes in Computer Science, page 503-506. Springer, (2002)A rotation and scale invariance face Recognition Method Based on Complex Network and Image Contour., , and . ICARCV, page 371-376. IEEE, (2012)Incentive Framework for Cross-Device Federated Learning and Analytics With Multiple Tasks Based on a Multi-Leader-Follower Game., , , , , and . IEEE Trans. Netw. Sci. Eng., 9 (5): 3749-3761 (2022)The Quantum Communications and Networking Project at the Information Technology Laboratory of NIST., , , , , and . CNS, page 1-6. IEEE, (2021)PKMark: A Robust Zero-distortion Blind Reversible Scheme for Watermarking Relational Databases., , , and . BigDataSE, page 72-79. IEEE, (2021)Fast Monte Carlo method to simulate atmospheric backscattering of wireless laser sensor network., , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 211-215. IEEE, (2020)Analysis and Design of a Single-Stage Bridgeless Isolated AC-DC Resonant Converter for Programmable AC Power Source Applications., , , , , , and . IEEE Access, (2020)Research on a Differential Geometric Guidance Law Based on Fractional-Order Theory., , and . IEEE Access, (2020)Jamming Mitigation via Aerial Reconfigurable Intelligent Surface: Passive Beamforming and Deployment Optimization., , , , and . IEEE Trans. Veh. Technol., 70 (6): 6232-6237 (2021)GrabAR: Occlusion-aware Grabbing Virtual Objects in AR., , , and . CoRR, (2019)