Author of the publication

Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach.

, , , , , and . Concurr. Comput. Pract. Exp., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Multi-task Scheduling Based on SMS., , and . CSSE (5), page 1086-1089. IEEE Computer Society, (2008)978-0-7695-3336-0.Uncovering milestone papers: A network diffusion and game theory approach., , , , , , and . J. Informetrics, 18 (3): 101545 (2024)The divided communities of shared concerns: Mapping the intellectual structure of e-Health research in social science journals., , , and . Int. J. Medical Informatics, 84 (1): 24-35 (2015)An Intra-Cell Frequency Reuse Plan for Triangular Cell Communication System., , and . VTC Fall, page 1603-1607. IEEE, (2007)Prediction of walking and life span of children with cerebral palsy, , and . Zhonghua Er Ke Za Zhi, 41 (3): 196--198 (March 2003)New byte error correcting codes with simple decoding for reliable cache design., , and . IOLTS, page 200-205. IEEE, (2015)Nano-Optical Studies of Superconducting Nanowire Single Photon Detectors., , , , , , , , , and . QuantumComm, volume 36 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 158-166. Springer, (2009)Asynchronous balanced gates tolerant to interconnect variability., , , , and . ISCAS, page 3190-3193. IEEE, (2008)Least Squares Generative Adversarial Networks, , , , and . (2016)cite arxiv:1611.04076.A Layered Multi-dimensional Description of Pilot's Workload Based on Objective Measures., and . HCI (17), volume 8020 of Lecture Notes in Computer Science, page 203-211. Springer, (2013)