Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 54 (1): 445-456 (January 2024)The Robustness of Graph k-shell Structure under Adversarial Attacks., , , , , and . CoRR, (2021)Field model for complex ionic fluids: analytical properties and numerical investigation., , , and . CoRR, (2019)Consensus of high order linear multi-agent systems using output error feedback., , and . CDC, page 3685-3690. IEEE, (2009)TSGN: Transaction Subgraph Networks for Identifying Ethereum Phishing Accounts., , , and . BlockSys, volume 1490 of Communications in Computer and Information Science, page 187-200. Springer, (2021)Stabilization of a class of congestion games via intermittent control., and . Sci. China Inf. Sci., (2022)TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum., , , , , , and . CoRR, (2022)Tet2 Regulates Osteoclast Differentiation by Interacting with Runx1 and Maintaining Genomic 5-Hydroxymethylcytosine (5hmC)., , , , , , , , , and 8 other author(s). Genom. Proteom. Bioinform., 16 (3): 172-186 (2018)A Synchronous Updating Rule for Evolutionary Congestion Games Based on Common Information., , and . CDC, page 4431-4436. IEEE, (2022)Orthogonal Decomposition of Incomplete-Profile Finite Game Space., , and . J. Syst. Sci. Complex., 35 (6): 2208-2222 (2022)