From post

Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach.

, , , , , и . Concurr. Comput. Pract. Exp., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of Multi-task Scheduling Based on SMS., , и . CSSE (5), стр. 1086-1089. IEEE Computer Society, (2008)978-0-7695-3336-0.Intelligent tractors: Review of online traction control process., , , , , , , , , и . Comput. Electron. Agric., (2020)Network closure, brokerage, and structural influence of journals: a longitudinal study of journal citation network in Internet research (2000-2010)., и . Scientometrics, 97 (3): 675-693 (2013)The divided communities of shared concerns: Mapping the intellectual structure of e-Health research in social science journals., , , и . Int. J. Medical Informatics, 84 (1): 24-35 (2015)The shock, the coping, the resilience: smartphone application use reveals Covid-19 lockdown effects on human behaviors., , , , , , , , и . EPJ Data Sci., 12 (1): 17 (декабря 2023)Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System., , , , , и . ICCCN, стр. 1-9. IEEE, (2018)Fabric Defect Detection Using Salience Metric for Color Dissimilarity and Positional Aggregation., , , , , и . IEEE Access, (2018)A Generalized-Impedance Based Stability Criterion for Three-Phase Grid-Connected Voltage Source Converters., , , , и . CoRR, (2017)Evolution of public cooperation on interdependent networks: The impact of biased utility functions, , и . CoRR, (2012)Further results on sampled-data synchronization control for chaotic neural networks with actuator saturation., , , , и . Neurocomputing, (2019)