Author of the publication

Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors.

, , , , and . J. Sensors, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Personalized sampling graph collection with local differential privacy for link prediction., , , , and . World Wide Web (WWW), 26 (5): 2669-2689 (September 2023)Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors., , , , and . J. Sensors, (2021)A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks., , , , , , and . J. Parallel Distributed Comput., (2020)Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 2018, 18, 2440., , , , and . Sensors, 19 (14): 3187 (2019)A method of chained recommendation for charging piles in internet of vehicles., , , , , and . Computing, 103 (2): 231-249 (2021)PRGAN: Personalized Recommendation with Conditional Generative Adversarial Networks., , , and . ICDM, page 729-738. IEEE, (2021)Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method., , and . Web Intelligence, page 24-28. IEEE Computer Society, (2004)Dynamic online consumer trust forming mechanism research based on Beijing, China., , , and . LISS, page 1-9. IEEE, (2016)Automatic Taxonomy Construction for Eye Colors Data without Using Context Information., , and . DSC, page 837-841. IEEE, (2018)Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks., , , , , and . DSC, page 405-409. IEEE, (2018)