Author of the publication

False Signal Injection Attack Detection of Cyber Physical Systems by Event-Triggered Distributed Filtering over Sensor Networks.

, , , and . ATIS, volume 651 of Communications in Computer and Information Science, page 142-153. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A voicing-driven packet loss recovery algorithm for analysis-by-synthesis predictive speech coders over Internet., , , and . IEEE Trans. Multim., 3 (1): 98-107 (2001)Multiperiod Asset Allocation Considering Dynamic Loss Aversion Behavior of Investors., , , and . IEEE Trans. Comput. Social Systems, 6 (1): 73-81 (2019)VHH Antibodies: Reagents for Mycotoxin Detection in Food Products., , , , and . Sensors, 18 (2): 485 (2018)Multiple Description Image Coding Based on Delta-Sigma Quantization With Rate-Distortion Optimization., , and . IEEE Trans. Image Processing, 21 (9): 4304-4309 (2012)SMALTA: practical and near-optimal FIB aggregation., , , , , , , and . CoNEXT, page 29. ACM, (2011)Topology modeling via cluster graphs., and . Internet Measurement Workshop, page 19-23. ACM, (2001)Unsupervised Triplet Hashing for Fast Image Retrieval., , , and . ACM Multimedia (Thematic Workshops), page 84-92. ACM, (2017)Redundancy-aware maximal cliques., , and . KDD, page 122-130. ACM, (2013)Constraint abstraction for vectorless power grid verification., and . DAC, page 87:1-87:6. ACM, (2013)The Research of Power Battery with Ultra-capacitor for Hybrid Vehicle., , and . ISNN (3), volume 6677 of Lecture Notes in Computer Science, page 274-279. Springer, (2011)