From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

One-Domain-One-Input: Adaptive Random Testing by Orthogonal Recursive Bisection With Restriction., , , , , и . IEEE Trans. Reliab., 68 (4): 1404-1428 (2019)An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints., , , , , , и . Inf. Sci., (2021)Distributed Framework for Detecting PMU Data Manipulation Attacks With Deep Autoencoders., , , , , и . IEEE Trans. Smart Grid, 10 (4): 4401-4410 (2019)Privacy-Preserving Hierarchical State Estimation in Untrustworthy Cloud Environments., , , и . IEEE Trans. Smart Grid, 12 (2): 1541-1551 (2021)Elimination by Linear Association: An Effective and Efficient Static Mirror Adaptive Random Testing., , , и . IEEE Access, (2019)A Deep End-to-End Model for Transient Stability Assessment With PMU Data., , , , , , и . IEEE Access, (2018)A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain., , , и . J. Sens. Actuator Networks, 11 (4): 86 (2022)An empirical comparison of commercial and open-source web vulnerability scanners., , , и . Softw. Pract. Exp., 50 (9): 1842-1857 (2020)A new semantic annotation approach for software vulnerability source code., , , , и . Int. J. Simul. Process. Model., 16 (1): 1-13 (2021)An automated framework for evaluating open-source web scanner vulnerability severity., , , , и . Serv. Oriented Comput. Appl., 14 (4): 297-307 (2020)