Author of the publication

On Data Integrity Attacks Against Real-Time Pricing in Energy-Based Cyber-Physical Systems.

, , , , and . IEEE Trans. Parallel Distributed Syst., 28 (1): 170-187 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling long-range dependencies in speech data for text-independent speaker recognition., and . ICASSP, page 4825-4828. IEEE, (2008)Research on OCR Post-processing Applications for Handwritten Recognition Based on Analysis of Scientific Materials., , and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 131-135. Springer, (2011)Availability Analysis Method of Multilevel Security Models with Credibility Characteristics, , , and . Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on, 1, page 175-178. (April 2009)Acceleration of Naive-Bayes algorithm on multicore processor for massive text classification., , , , , , , and . ISIC, page 344-347. IEEE, (2014)Energy harvesting from human motion for wearable devices., , , , and . NEMS, page 409-412. IEEE, (2015)Global Workspace and Direct Cortex Access: An Astral Framework for Consciousness., , and . IC-AI, page 521-524. CSREA Press, (2004)Group Invariant Deep Representations for Image Instance Retrieval., , , , , and . AAAI Spring Symposia, AAAI Press, (2017)Tiny Descriptors for Image Retrieval with Unsupervised Triplet Hashing., , , , and . CoRR, (2015)Beyond Ranking Loss: Deep Holographic Networks for Multi-Label Video Search., , , , and . ICIP, page 879-883. IEEE, (2019)Region average pooling for context-aware object detection., , , , and . ICIP, page 1347-1351. IEEE, (2017)