Author of the publication

Detecting stealthy attacks on industrial control systems using a permutation entropy-based method.

, , , , , , and . Future Gener. Comput. Syst., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Domain Ontology Learning Enhanced by Optimized Relation Instance in DBpedia., , , , and . LREC, European Language Resources Association (ELRA), (2016)MAG2DL: A Framework for Information Retrieval and Integration of Distributed Geographic Digital Libraries., , , , , , and . ICADL, volume 2911 of Lecture Notes in Computer Science, page 351-364. Springer, (2003)Secret Sharing, Rank Inequalities and Information Inequalities., , and . CRYPTO (2), volume 8043 of Lecture Notes in Computer Science, page 277-288. Springer, (2013)Positioning method for pipeline security pre-warning system based on the third-order cumulant algorithm., , , , , and . AIM, page 1576-1578. IEEE, (2013)Pipeline pricing and logistics planning in the refined product supply chain based on fair profit distribution., , , , , , and . Comput. Ind. Eng., (2023)Multi-classification for EEG Motor Imagery Signals using Auto-selected Filter Bank Regularized Common Spatial Pattern., , and . ISMICT, page 1-6. IEEE, (2022)Longitudinal analysis of regional cerebellum volumes during normal aging., , , , and . NeuroImage, (2020)Prompt Tuning for Generative Multimodal Pretrained Models., , , , , and . CoRR, (2022)M6: Multi-Modality-to-Multi-Modality Multitask Mega-transformer for Unified Pretraining., , , , , , , , and . KDD, page 3251-3261. ACM, (2021)Evaluation Metrics for Headline Generation Using Deep Pre-Trained Embeddings., , , and . LREC, page 1796-1802. European Language Resources Association, (2020)