From post

Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach.

, , , , , и . Concurr. Comput. Pract. Exp., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of Multi-task Scheduling Based on SMS., , и . CSSE (5), стр. 1086-1089. IEEE Computer Society, (2008)978-0-7695-3336-0.Uncovering milestone papers: A network diffusion and game theory approach., , , , , , и . J. Informetrics, 18 (3): 101545 (2024)The divided communities of shared concerns: Mapping the intellectual structure of e-Health research in social science journals., , , и . Int. J. Medical Informatics, 84 (1): 24-35 (2015)An Intra-Cell Frequency Reuse Plan for Triangular Cell Communication System., , и . VTC Fall, стр. 1603-1607. IEEE, (2007)New byte error correcting codes with simple decoding for reliable cache design., , и . IOLTS, стр. 200-205. IEEE, (2015)Asynchronous balanced gates tolerant to interconnect variability., , , , и . ISCAS, стр. 3190-3193. IEEE, (2008)Least Squares Generative Adversarial Networks, , , , и . (2016)cite arxiv:1611.04076.Interactive Fault Extraction in 3-D Seismic Data Using the Hough Transform and Tracking Vectors., и . IEEE Trans. Computational Imaging, 3 (1): 99-109 (2017)Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System., , , , , и . ICCCN, стр. 1-9. IEEE, (2018)Concurrent Processing Memory, и . CoRR, (2006)