Author of the publication

Power System Cyber-Attack Event Recognition Method Based on Extreme Random Trees.

, , , , , and . ICSPCC, page 1-6. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comprehensive three-phase load flow method for integrated MV and LV distribution networks., , , , and . ISGT Asia, page 1-5. IEEE, (2017)Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree., , , , , and . J. Netw. Syst. Manag., 32 (2): 32 (April 2024)Mineral Identification and Mapping by Synthesis of Hyperspectral VNIR/SWIR and Multispectral TIR Remotely Sensed Data With Different Classifiers., , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2020)Power System Cyber-Attack Event Recognition Method Based on Extreme Random Trees., , , , , and . ICSPCC, page 1-6. IEEE, (2023)Overview of Research on Cloud-Edge-End Collaboration Technology of Industrial Control System., , , , , and . CECCT, page 169-174. ACM, (2023)Cooperative multi-task assignment modeling of UAV based on particle swarm optimization., and . Intell. Decis. Technol., 18 (2): 919-934 (2024)Research on remote sensing information recommendation technology based on collaborative filtering., , , , , and . EITCE, page 297-301. ACM, (2021)Adaptive NN control for a class of strict-feedback nonlinear systems., , and . ACC, page 81-86. IEEE, (2008)Adaptive recommendation technology for remote sensing information based on behavior analysis., , , , , and . AIIPCC, page 50:1-50:5. ACM, (2019)A Case for Lightweight SuperPeer Topologies., , and . KiVS Kurzbeiträge und Workshop, volume P-61 of LNI, page 185-188. GI, (2005)