Author of the publication

Guest Editorial: Computational Intelligence for Human-in-the-Loop Cyber Physical Systems.

, , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 6 (1): 2-5 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Anomalies and Faults in Industrial IoT Systems by Data Mining: Study of CHRIST Osmotron Water Purification System., , , , and . CoRR, (2020)RICA-MD: A Refined ICA Algorithm for Motion Detection., , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 17 (1s): 17:1-17:17 (2021)Introduction to the Special Issue on Affective Services based on Representation Learning., , , and . ACM Trans. Multim. Comput. Commun. Appl., 18 (3s): 135e:1-135e:2 (2022)A Blockchain-Based Mutual Authentication Method to Secure the Electric Vehicles' TPMS., , , , , and . IEEE Trans. Ind. Informatics, 20 (1): 158-168 (January 2024)Experience-Driven Attack Design and Federated-Learning-Based Intrusion Detection in Industry 4.0., , and . IEEE Trans. Ind. Informatics, 18 (9): 6398-6405 (2022)A Novel Real-Time Deterministic Scheduling Mechanism in Industrial Cyber-Physical Systems for Energy Internet., , and . IEEE Trans. Ind. Informatics, 18 (8): 5670-5680 (2022)A Fast Prekeying-Based Integrity Protection for Smart Grid Communications., , and . IEEE Trans. Ind. Informatics, 17 (8): 5751-5758 (2021)Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset., , , , , , , and . Multim. Tools Appl., 81 (29): 41429-41453 (2022)Self-attention-based conditional random fields latent variables model for sequence labeling., , , , , and . Pattern Recognit. Lett., (2021)Preserving the confidentiality of digital images using a chaotic encryption scheme., , and . Int. J. Electron. Secur. Digit. Forensics, 7 (3): 258-277 (2015)