Author of the publication

Source-Load Coordinated Reserve Allocation Strategy Considering Cyber-Attack Risks.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Source-Load Coordinated Reserve Allocation Strategy Considering Cyber-Attack Risks., , , and . IEEE Access, (2019)File Relation Graph Based Malware Detection Using Label Propagation., , , , and . WISE (2), volume 9419 of Lecture Notes in Computer Science, page 164-176. Springer, (2015)Teaching Reform of Steel Structure Curriculum Basing on Study-Group Method and SPOC Platform., , , , and . ICEIT, page 5-9. IEEE, (2021)Learning to Generate Radiology Findings from Impressions Based on Large Language Model., , , , and . IEEE Big Data, page 2550-2554. IEEE, (2023)Internet-Based Manufacturing Scheduling: Architecture and Implementation., , , and . ICRA, page 1107-1112. IEEE, (2002)FIRST: Face Identity Recognition in SmarT Bank., , , , , , and . Int. J. Semantic Comput., 10 (4): 569- (2016)Weighted sparse representation for face recognition., , , and . Neurocomputing, (2015)An inventory control policy for maintenance networks., , , and . IROS, page 1238-1244. IEEE, (2004)Survey on Defense Technology of Web Application Based on Interpretive Dynamic Programming Languages., , , and . ICCCS, page 795-801. IEEE, (2022)Multi-task Command and Control System based on Cloud Architecture., , , , and . SSIP, page 42-47. ACM, (2021)