Author of the publication

Flexibility Robust Optimal Operation Strategy for Cross-Regional Interconnected Power Under Load-Source Coordination.

, , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3D Aerial Vehicle Base Station (UAV-BS) Position Planning based on Deep Q-Learning for Capacity Enhancement of Users With Different QoS Requirements., , , , , , and . IWCMC, page 1508-1512. IEEE, (2019)Privacy Protection and Secure Transmission of Smart Meter Data., , , , and . ISMICT, page 173-178. IEEE, (2021)On the preferences of quality indicators for multi-objective search algorithms in search-based software engineering., , , , and . Empir. Softw. Eng., 27 (6): 144 (2022)A Chaotic Image Encryption Scheme Based on Hénon-Chebyshev Modulation Map and Genetic Operations., , , and . Int. J. Bifurc. Chaos, 30 (6): 2050090:1-2050090:22 (2020)Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation., , , , and . Comput. Secur., (2020)MagicPhone: pointing & interacting., , , , and . UbiComp (Adjunct Papers), page 451-452. ACM, (2010)Predicting Perceived Level of Cycling Safety for Cycling Trips., , and . SIGSPATIAL/GIS, page 456-459. ACM, (2019)Reality Bites: Assessing the Realism of Driving Scenarios with Large Language Models., , , , and . FORGE, page 40-51. ACM, (2024)SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing., , , , , and . IEEE Trans. Cloud Comput., 10 (1): 691-705 (2022)Gesture Recognition with a 3-D Accelerometer., , , , and . UIC, volume 5585 of Lecture Notes in Computer Science, page 25-38. Springer, (2009)