Author of the publication

Wind-Thermal-CSP Bundling Model With an Adjustable Heat Storage Strategy for CSP Stations.

, , , , , , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications., , , , , and . DSC, page 91-98. IEEE, (2021)Wind-Thermal-CSP Bundling Model With an Adjustable Heat Storage Strategy for CSP Stations., , , , , , , , and . IEEE Access, (2021)Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario., , , , , and . ICEA, page 205-210. ACM, (2021)A Fuzzy Appraisement-based Applied Study on High-temperature Corrosion of a Thermal Power Plant., , , , and . FSKD (5), page 227-231. IEEE Computer Society, (2009)2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks., , , , , and . ISCC, page 1-7. IEEE, (2020)How Well Do Large Language Models Understand Syntax? An Evaluation by Asking Natural Language Questions., , , , , , and . CoRR, (2023)Optimal and Low-Memory Near-Optimal Preconditioning of Fully Implicit Runge-Kutta Schemes for Parabolic PDEs., , and . CoRR, (2020)An Emotional Face Evoked EEG Signal Recognition Method Based on Optimal EEG Feature and Electrodes Selection., , , , , , and . ICONIP (1), volume 7062 of Lecture Notes in Computer Science, page 296-305. Springer, (2011)A closer look at Eclipse attacks against Tor hidden services., , , , and . ICC, page 1-6. IEEE, (2017)WLS-ENO Remap: Superconvergent and Non-Oscillatory Weighted Least Squares Data Transfer on Surfaces., , , and . CoRR, (2019)