Author of the publication

Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid.

, , , and . Comput. Secur., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximation strategy based on the T-product for third-order quaternion tensors with application to color video compression., and . Appl. Math. Lett., (June 2023)Unconstrained minimization of block-circulant polynomials via semidefinite program in third-order tensor space., , and . J. Glob. Optim., 84 (2): 415-440 (2022)A Note on the Nonemptiness and Compactness of Solution Sets of Weakly Homogeneous Variational Inequalities., , and . SIAM J. Optim., 30 (1): 132-148 (2020)Nonemptiness and Compactness of Solution Sets to Generalized Polynomial Complementarity Problems., , and . J. Optim. Theory Appl., 185 (1): 80-98 (2020)T-positive semidefiniteness of third-order symmetric tensors and T-semidefinite programming., , and . Comput. Optim. Appl., 78 (1): 239-272 (2021)Unique solvability of weakly homogeneous generalized variational inequalities., , and . J. Glob. Optim., 80 (4): 921-943 (2021)Nonemptiness and Compactness of Solution Sets to Weakly Homogeneous Generalized Variational Inequalities., , and . J. Optim. Theory Appl., 189 (3): 919-937 (2021)Heterogeneous coexistence between cognitive radio networks: a Markovian jump system method., , and . Telecommun. Syst., 68 (3): 563-572 (2018)GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids., , , and . IEEE Trans. Netw. Sci. Eng., 7 (2): 805-816 (2020)AODR: An Automatic On-Demand Retransmission Scheme for WIA-FA Networks., , , and . IEEE Trans. Veh. Technol., 70 (6): 6094-6107 (2021)