Author of the publication

Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid.

, , , , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Wireless Covert Channel Based on Constellation Shaping Modulation., , , , , and . Secur. Commun. Networks, (2018)Skeleton embedded motion body partition for human action recognition using depth sequences., , , and . Signal Process., (2018)Dynamic channel allocation strategy for quality of service enhancement in wireless ad hoc networks., , and . Concurr. Comput. Pract. Exp., (2022)CAS-YNU Multi-modal Cross-view Human Action Dataset., , , , and . ICIA, page 678-683. IEEE, (2018)Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network., , , , and . IEEE Access, (2018)An end-to-end generative network for environmental sound-based covert communication., , , , and . Multimedia Tools Appl., 78 (7): 8635-8653 (2019)Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model., , , and . J. Ambient Intell. Humaniz. Comput., 12 (9): 8859-8866 (2021)Effective vehicle detection technique for traffic surveillance systems., , and . J. Vis. Commun. Image Represent., 17 (3): 647-658 (2006)Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks., , , and . Sensors, 23 (23): 9411 (December 2023)Differentially Private Linear Regression Analysis via Truncating Technique., , , , , , , and . WISA, volume 12999 of Lecture Notes in Computer Science, page 249-260. Springer, (2021)