Author of the publication

Detecting replay attacks against industrial robots via power fingerprinting.

, , , , , and . SenSys, page 285-297. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Research for Spatial Role-Based Access Control Model., , , and . ICCSA (4), volume 6019 of Lecture Notes in Computer Science, page 296-308. Springer, (2010)Impacts of unreliable communication and regret matching based anti-jamming approach in smart grid., , and . ISGT, page 1-5. IEEE, (2014)Adaptive working schedule for duty-cycle opportunistic mobile networks., , , and . ICC, page 1565-1569. IEEE, (2013)Towards Optimal Operation State Scheduling in RF-Powered Internet of Things., , , , and . SECON, page 361-369. IEEE, (2018)Minimizing communication delay in RFID-based wireless rechargeable sensor networks., , , , and . SECON, page 441-449. IEEE, (2014)Cross-Layer Optimization of Correlated Data Gathering in Wireless Sensor Networks., , , and . SECON, page 448-456. IEEE, (2010)Hybrid Traffic Speed Modeling and Prediction Using Real-World Data., , , , and . BigData Congress, page 230-237. IEEE Computer Society, (2015)A scalable Hybrid MAC protocol for massive M2M networks., , , and . WCNC, page 250-255. IEEE, (2013)Dynamic sensor data scheduling for remote estimation over Gilbert-Elliot channel., , and . ICCC, page 26-30. IEEE, (2014)On Effectiveness of Detecting FDI Attacks on Power Grid using Moving Target Defense., , , , and . ISGT, page 1-5. IEEE, (2019)