Author of the publication

Training Strategies for Autoencoder-based Detection of False Data Injection Attacks.

, , , and . ISGT-Europe, page 1-5. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Meta-Path Constrained Random Walk Inference for Large-Scale Heterogeneous Information Networks.. CoRR, (2019)Calculation and Analysis of the Strands Short-Circuit in Stator Transposition Bar for Large Generators., , , , and . IEEE Access, (2019)Detection of False Data Injection Attacks Using the Autoencoder Approach., , , and . CoRR, (2020)Transformer on a Diet., , , , and . CoRR, (2020)A feature selection method based on term frequency difference and positive weighting factor., , , and . Data Knowl. Eng., (2022)Anomaly Detection and Synthetic Data Generation for Power Systems Using Autoencoder Neural Networks.. Delft University of Technology, Netherlands, (2023)base-search.net (fttudelft:oai:tudelft.nl:uuid:12708aca-dff2-4d59-aa0e-af5c275aa728).A Drug Safety Traceability Model Based on Big Data., , , , and . BDE, page 1-7. ACM, (2022)Text Classification with Heterogeneous Information Network Kernels., , , , and . AAAI, page 2130-2136. AAAI Press, (2016)Spectral Label Refinement for Noisy and Missing Text Labels., , , , and . AAAI, page 2972-2978. AAAI Press, (2015)Medical service oriented blockchain data credibility evaluation method., , , , , , and . ICSS, page 277-282. IEEE, (2022)