Author of the publication

Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks.

, , , , , , , , and . ACM Trans. Embed. Comput. Syst., 22 (5s): 103:1-103:22 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Vote Privately Using Bitcoin., and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 82-96. Springer, (2015)Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks., , , , , , , , and . ACM Trans. Embed. Comput. Syst., 22 (5s): 103:1-103:22 (October 2023)Power Grid Knowledge Graph Completion with Complex Structure Learning., , , , , , , and . ICIC (5), volume 14090 of Lecture Notes in Computer Science, page 669-679. Springer, (2023)1st Place Solutions for UG2+ Challenge 2022 ATMOSPHERIC TURBULENCE MITIGATION., , , , , and . CoRR, (2022)Intent recognition model based on sequential information and sentence features., , , and . Neurocomputing, (January 2024)Civil airline fare prediction with a multi-attribute dual-stage attention mechanism., , , , and . Appl. Intell., 52 (5): 5047-5062 (2022)On the Complexity of the Minimum Independent Set Partition Problem., , and . COCOON, volume 9198 of Lecture Notes in Computer Science, page 121-132. Springer, (2015)Ranking on Arbitrary Graphs: Rematch via Continuous Linear Programming., , , and . SIAM J. Comput., 47 (4): 1529-1546 (2018)Rolling Bearing Fault Diagnosis Method Based On Dual Invariant Feature Domain Generalization., , , , , , and . IEEE Trans. Instrum. Meas., (2024)Privacy-Preserving Machine Learning as a Service: Challenges and Opportunities., , , , , and . IEEE Netw., 37 (6): 214-223 (November 2023)